Computer-Based National Information Systems. Technology and Public Policy Issues.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
EMRlog method for computer security for electronic medical records with logic and data mining.
Martínez Monterrubio, Sergio Mauricio; Frausto Solis, Juan; Monroy Borja, Raúl
2015-01-01
The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.
EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
Frausto Solis, Juan; Monroy Borja, Raúl
2015-01-01
The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. PMID:26495300
Appropriate Use Policies for Computers in College/University Libraries. CLIP Note.
ERIC Educational Resources Information Center
Tuten, Jane, Comp.; Junker, Karen, Comp.
The purpose of this College Library Information Packet (CLIP) Note is to help libraries identify desirable elements found in computer use policies and to provide guidelines for college and small university libraries that want to develop policies or have been directed to implement policies for computer usage in their libraries. In January 2001, a…
An Information Policy for the Information Age.
ERIC Educational Resources Information Center
Blake, Virgil; Surprenant, Thomas
1988-01-01
Discusses recent federal information policies that pose a threat to access to information. A short-lived policy for protection of sensitive but unclassified information is criticized, and the Computer Security Act of 1987, currently under consideration in Congress, is described. Involvement by the library and information community in developing…
Information Technology Policies. SPEC Kit 218.
ERIC Educational Resources Information Center
Leung, Shirley; Bisom, Diane
The objectives of this survey were: to gather information on the development of institutional information technology policies and guidelines for responsible computing and use of electronic information; to identify the scope of such policies and guidelines; and to determine the role of the library in the development and/or use of the policies and…
Policy Information System Computer Program.
ERIC Educational Resources Information Center
Hamlin, Roger E.; And Others
The concepts and methodologies outlined in "A Policy Information System for Vocational Education" are presented in a simple computer format in this booklet. It also contains a sample output representing 5-year projections of various planning needs for vocational education. Computerized figures in the eight areas corresponding to those in the…
ERIC Educational Resources Information Center
Oettinger, Anthony G.
2000-01-01
Describes the Harvard Program on Information Resources Policy (PIRP) that studies how public policy and strategic corporate decisions affect information systems, including computer technologies; postal and mechanical transportation systems; information use by civilian and military organizations; effect of new technologies; international politics;…
2005-07-01
policies in pervasive computing environments. In this context, the owner of information sources (e.g. user, sensor, application, or organization...work in decentralized trust management and semantic web technologies . Section 3 introduces an Information Disclosure Agent architecture for...Norman Sadeh July 2005 CMU-ISRI-05-113 School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213
Code of Federal Regulations, 2011 CFR
2011-10-01
... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...
Code of Federal Regulations, 2013 CFR
2013-10-01
... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...
Code of Federal Regulations, 2014 CFR
2014-10-01
... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...
Code of Federal Regulations, 2012 CFR
2012-10-01
... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...
Overview of Computer Security Certification and Accreditation. Final Report.
ERIC Educational Resources Information Center
Ruthberg, Zella G.; Neugent, William
Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…
ERIC Educational Resources Information Center
Pinelli, Thomas E.; And Others
1992-01-01
Discusses U.S. technology policy and the transfer of scientific and technical information (STI). Results of a study of knowledge diffusion in the aerospace industry are reported, including data on aerospace information intermediaries, use of computer and information technologies, and the use of NASA (National Aeronautics and Space Administration)…
A new decision sciences for complex systems.
Lempert, Robert J
2002-05-14
Models of complex systems can capture much useful information but can be difficult to apply to real-world decision-making because the type of information they contain is often inconsistent with that required for traditional decision analysis. New approaches, which use inductive reasoning over large ensembles of computational experiments, now make possible systematic comparison of alternative policy options using models of complex systems. This article describes Computer-Assisted Reasoning, an approach to decision-making under conditions of deep uncertainty that is ideally suited to applying complex systems to policy analysis. The article demonstrates the approach on the policy problem of global climate change, with a particular focus on the role of technology policies in a robust, adaptive strategy for greenhouse gas abatement.
Operating Policies and Procedures of Computer Data-Base Systems.
ERIC Educational Resources Information Center
Anderson, David O.
Speaking on the operating policies and procedures of computer data bases containing information on students, the author divides his remarks into three parts: content decisions, data base security, and user access. He offers nine recommended practices that should increase the data base's usefulness to the user community: (1) the cost of developing…
ERIC Educational Resources Information Center
Michelson, Avra; Rothenberg, Jeff
1993-01-01
The report considers the interaction of trends in information technology and trends in research practices and the policy implications for archives. The information is divided into 4 sections. The first section, an "Overview of Information Technology Trends," discusses end-user computing, which includes ubiquitous computing, end-user…
An empirical analysis of journal policy effectiveness for computational reproducibility.
Stodden, Victoria; Seiler, Jennifer; Ma, Zhaokun
2018-03-13
A key component of scientific communication is sufficient information for other researchers in the field to reproduce published findings. For computational and data-enabled research, this has often been interpreted to mean making available the raw data from which results were generated, the computer code that generated the findings, and any additional information needed such as workflows and input parameters. Many journals are revising author guidelines to include data and code availability. This work evaluates the effectiveness of journal policy that requires the data and code necessary for reproducibility be made available postpublication by the authors upon request. We assess the effectiveness of such a policy by ( i ) requesting data and code from authors and ( ii ) attempting replication of the published findings. We chose a random sample of 204 scientific papers published in the journal Science after the implementation of their policy in February 2011. We found that we were able to obtain artifacts from 44% of our sample and were able to reproduce the findings for 26%. We find this policy-author remission of data and code postpublication upon request-an improvement over no policy, but currently insufficient for reproducibility.
Structural Consequences of Retention Policies: The Use of Computer Models To Inform Policy.
ERIC Educational Resources Information Center
Morris, Don R.
This paper reports on a longitudinal study of the structural effects of grade retention on dropout rate and percent of graduates qualified. The study drew on computer simulation to explore the effects of retention and how this practice affects dropout rate, the percent of graduates who meet required standards, and enrollment itself. The computer…
Annual Report of the Metals and Ceramics Information Center, 1 May 1979-30 April 1980.
1980-07-01
MANAGEMENT AND ECONOMIC ANALYSIS DEPT. * Computer and Information SyslemsiD. C Operations 1 Battelle Technical Inputs to Planning * Computer Systems 0...Biomass Resources * Education 0 Business Planning * Information Systems * Economics , Planning and Policy Analysis * Statistical and Mathematical Modelrng...Metals and Ceramics Information Center (MCIC) is one of several technical information analysis centers (IAC’s) chartered and sponsored by the
ERIC Educational Resources Information Center
Watkins, Ryan; Engel, Laura C.; Hastedt, Dirk
2015-01-01
The rise of digital information and communication technologies (ICT) has made the acquisition of computer and information literacy (CIL) a leading factor in creating an engaged, informed, and employable citizenry. However, are young people, often described as "digital natives" or the "net generation," developing the necessary…
Population-based learning of load balancing policies for a distributed computer system
NASA Technical Reports Server (NTRS)
Mehra, Pankaj; Wah, Benjamin W.
1993-01-01
Effective load-balancing policies use dynamic resource information to schedule tasks in a distributed computer system. We present a novel method for automatically learning such policies. At each site in our system, we use a comparator neural network to predict the relative speedup of an incoming task using only the resource-utilization patterns obtained prior to the task's arrival. Outputs of these comparator networks are broadcast periodically over the distributed system, and the resource schedulers at each site use these values to determine the best site for executing an incoming task. The delays incurred in propagating workload information and tasks from one site to another, as well as the dynamic and unpredictable nature of workloads in multiprogrammed multiprocessors, may cause the workload pattern at the time of execution to differ from patterns prevailing at the times of load-index computation and decision making. Our load-balancing policy accommodates this uncertainty by using certain tunable parameters. We present a population-based machine-learning algorithm that adjusts these parameters in order to achieve high average speedups with respect to local execution. Our results show that our load-balancing policy, when combined with the comparator neural network for workload characterization, is effective in exploiting idle resources in a distributed computer system.
Information Technology: Making It All Fit. Track I: Policy and Planning.
ERIC Educational Resources Information Center
CAUSE, Boulder, CO.
Seven papers from the 1988 CAUSE conference's Track I, Policy and Planning, are presented. They include: "Developing a Strategic Plan for Academic Computing" (Arthur S. Gloster II); "New Technologies Are Presenting a Crisis for Middle Management" (M. Lewis Temares and Ruben Lopez); "An Information Utility: The Light, Gas,…
Eley, Robert; Fallon, Tony; Soar, Jeffrey; Buikstra, Elizabeth; Hegney, Desley
2008-10-01
A study was undertaken of the current knowledge and future training requirements of nurses in information and computer technology to inform policy to meet national goals for health. The role of the modern clinical nurse is intertwined with information and computer technology and adoption of such technology forms an important component of national strategies in health. The majority of nurses are expected to use information and computer technology during their work; however, the full extent of their knowledge and experience is unclear. Self-administered postal survey. A 78-item questionnaire was distributed to 10,000 Australian Nursing Federation members to identify the nurses' use of information and computer technology. Eighteen items related to nurses' training and education in information and computer technology. Response rate was 44%. Computers were used by 86.3% of respondents as part of their work-related activities. Between 4-17% of nurses had received training in each of 11 generic computer skills and software applications during their preregistration/pre-enrolment and between 12-30% as continuing professional education. Nurses who had received training believed that it was adequate to meet the needs of their job and was given at an appropriate time. Almost half of the respondents indicated that they required more training to better meet the information and computer technology requirements of their jobs and a quarter believed that their level of computer literacy was restricting their career development. Nurses considered that the vast majority of employers did not encourage information and computer technology training and, for those for whom training was available, workload was the major barrier to uptake. Nurses favoured introduction of a national competency standard in information and computer technology. For the considerable benefits of information and computer technology to be incorporated fully into the health system, employers must pay more attention to the training and education of nurses who are the largest users of that technology. Knowledge of the training and education needs of clinical nurses with respect to information and computer technology will provide a platform for the development of appropriate policies by government and by employers.
Lebeda, Frank J; Zalatoris, Jeffrey J; Scheerer, Julia B
2018-02-07
This position paper summarizes the development and the present status of Department of Defense (DoD) and other government policies and guidances regarding cloud computing services. Due to the heterogeneous and growing biomedical big datasets, cloud computing services offer an opportunity to mitigate the associated storage and analysis requirements. Having on-demand network access to a shared pool of flexible computing resources creates a consolidated system that should reduce potential duplications of effort in military biomedical research. Interactive, online literature searches were performed with Google, at the Defense Technical Information Center, and at two National Institutes of Health research portfolio information sites. References cited within some of the collected documents also served as literature resources. We gathered, selected, and reviewed DoD and other government cloud computing policies and guidances published from 2009 to 2017. These policies were intended to consolidate computer resources within the government and reduce costs by decreasing the number of federal data centers and by migrating electronic data to cloud systems. Initial White House Office of Management and Budget information technology guidelines were developed for cloud usage, followed by policies and other documents from the DoD, the Defense Health Agency, and the Armed Services. Security standards from the National Institute of Standards and Technology, the Government Services Administration, the DoD, and the Army were also developed. Government Services Administration and DoD Inspectors General monitored cloud usage by the DoD. A 2016 Government Accountability Office report characterized cloud computing as being economical, flexible and fast. A congressionally mandated independent study reported that the DoD was active in offering a wide selection of commercial cloud services in addition to its milCloud system. Our findings from the Department of Health and Human Services indicated that the security infrastructure in cloud services may be more compliant with the Health Insurance Portability and Accountability Act of 1996 regulations than traditional methods. To gauge the DoD's adoption of cloud technologies proposed metrics included cost factors, ease of use, automation, availability, accessibility, security, and policy compliance. Since 2009, plans and policies were developed for the use of cloud technology to help consolidate and reduce the number of data centers which were expected to reduce costs, improve environmental factors, enhance information technology security, and maintain mission support for service members. Cloud technologies were also expected to improve employee efficiency and productivity. Federal cloud computing policies within the last decade also offered increased opportunities to advance military healthcare. It was assumed that these opportunities would benefit consumers of healthcare and health science data by allowing more access to centralized cloud computer facilities to store, analyze, search and share relevant data, to enhance standardization, and to reduce potential duplications of effort. We recommend that cloud computing be considered by DoD biomedical researchers for increasing connectivity, presumably by facilitating communications and data sharing, among the various intra- and extramural laboratories. We also recommend that policies and other guidances be updated to include developing additional metrics that will help stakeholders evaluate the above mentioned assumptions and expectations. Published by Oxford University Press on behalf of the Association of Military Surgeons of the United States 2018. This work is written by (a) US Government employee(s) and is in the public domain in the US.
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
An empirical analysis of journal policy effectiveness for computational reproducibility
Seiler, Jennifer; Ma, Zhaokun
2018-01-01
A key component of scientific communication is sufficient information for other researchers in the field to reproduce published findings. For computational and data-enabled research, this has often been interpreted to mean making available the raw data from which results were generated, the computer code that generated the findings, and any additional information needed such as workflows and input parameters. Many journals are revising author guidelines to include data and code availability. This work evaluates the effectiveness of journal policy that requires the data and code necessary for reproducibility be made available postpublication by the authors upon request. We assess the effectiveness of such a policy by (i) requesting data and code from authors and (ii) attempting replication of the published findings. We chose a random sample of 204 scientific papers published in the journal Science after the implementation of their policy in February 2011. We found that we were able to obtain artifacts from 44% of our sample and were able to reproduce the findings for 26%. We find this policy—author remission of data and code postpublication upon request—an improvement over no policy, but currently insufficient for reproducibility. PMID:29531050
Reviewing and reforming policy in health enterprise information security
NASA Astrophysics Data System (ADS)
Sostrom, Kristen; Collmann, Jeff R.
2001-08-01
Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.
Information Technology: Making It All Fit. Track VIII: Academic Computing Strategy.
ERIC Educational Resources Information Center
CAUSE, Boulder, CO.
Six papers from the 1988 CAUSE conference's Track VIII, Academic Computing Strategy, are presented. They include: "Achieving Institution-Wide Computer Fluency: A Five-Year Retrospective" (Paul J. Plourde); "A Methodology and a Policy for Building and Implementing a Strategic Computer Plan" (Frank B. Thomas); "Aligning…
ERIC Educational Resources Information Center
Organisation for Economic Cooperation and Development, Paris (France).
This report focuses on the consumer information potential of computerized telecommunication systems, their possible advantages and drawbacks for the consumer, and the new policy issues created by the new medium, i.e., the possible economic, social, and legal implications for consumers. Topics addressed include the main features of the new…
Policy Issues in Computer Networks: Multi-Access Information Systems.
ERIC Educational Resources Information Center
Lyons, Patrice A.
As computer databases become more publicly accessible through public networks, there is a growing need to provide effective protection for proprietary information. Without adequate assurances that their works will be protected, authors and other copyright owners may be reluctant to allow the full text of their works to be accessed through computer…
Current Issues for Higher Education Information Resources Management.
ERIC Educational Resources Information Center
CAUSE/EFFECT, 1996
1996-01-01
Issues identified as important to the future of information resources management and use in higher education include information policy in a networked environment, distributed computing, integrating information resources and college planning, benchmarking information technology, integrated digital libraries, technology integration in teaching,…
ERIC Educational Resources Information Center
Guzdial, Mark; Ericson, Barbara; Mcklin, Tom; Engelman, Shelly
2014-01-01
Georgia Computes! ("GaComputes") was a six-year (2006-2012) project to improve computing education across the state of Georgia in the United States, funded by the National Science Foundation. The goal of GaComputes was to broaden participation in computing and especially to engage more members of underrepresented groups which includes…
Access to Inter-Organization Computer Networks.
1985-08-01
management of computing and information systems, system management . 20. ABSTRACT (Continue on reverse aide it neceeery end identify by block number) When two...necessary control mechanisms. Message-based gateways that support non-real-time invocation of services (e.g., file and print servers, financial ...operations (C.2.3), electronic mail (H.4.3), public policy issues (K.4.1), organizationa impacts (K.4.3), management of computing and information systems (K.6
Challenges and Opportunities of Information Technology in the 90s. Track IV: Policy and Standards.
ERIC Educational Resources Information Center
CAUSE, Boulder, CO.
Seven papers from the 1990 CAUSE conference's Track IV, Policy and Standards are presented. Topics addressed in this track include data administration, computing access, involvement of constituencies in policy making and enforcement, and institutional standards for departmental systems. Papers and their authors are as follows: "Evolution of a…
ERIC Educational Resources Information Center
Pogrow, Stanley
Suggesting new policies for integrating technology into existing goals of the public schools, this book presents the argument that substantial educational improvements can be made through the use of computers. Chapter 1 contains an assessment describing the nature of technology events thought likely to occur during the 1980s. (A technology event…
Computer Technology and Social Issues.
ERIC Educational Resources Information Center
Garson, G. David
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Proceedings from the conference on high speed computing: High speed computing and national security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hirons, K.P.; Vigil, M.; Carlson, R.
1997-07-01
This meeting covered the following topics: technologies/national needs/policies: past, present and future; information warfare; crisis management/massive data systems; risk assessment/vulnerabilities; Internet law/privacy and rights of society; challenges to effective ASCI programmatic use of 100 TFLOPs systems; and new computing technologies.
ERIC Educational Resources Information Center
Sargent, John
The Office of Technology Policy analyzed Bureau of Labor Statistics' growth projections for the core occupational classifications of IT (information technology) workers to assess future demand in the United States. Classifications studied were computer engineers, systems analysts, computer programmers, database administrators, computer support…
Informed public choices for low-carbon electricity portfolios using a computer decision tool.
Mayer, Lauren A Fleishman; Bruine de Bruin, Wändi; Morgan, M Granger
2014-04-01
Reducing CO2 emissions from the electricity sector will likely require policies that encourage the widespread deployment of a diverse mix of low-carbon electricity generation technologies. Public discourse informs such policies. To make informed decisions and to productively engage in public discourse, citizens need to understand the trade-offs between electricity technologies proposed for widespread deployment. Building on previous paper-and-pencil studies, we developed a computer tool that aimed to help nonexperts make informed decisions about the challenges faced in achieving a low-carbon energy future. We report on an initial usability study of this interactive computer tool. After providing participants with comparative and balanced information about 10 electricity technologies, we asked them to design a low-carbon electricity portfolio. Participants used the interactive computer tool, which constrained portfolio designs to be realistic and yield low CO2 emissions. As they changed their portfolios, the tool updated information about projected CO2 emissions, electricity costs, and specific environmental impacts. As in the previous paper-and-pencil studies, most participants designed diverse portfolios that included energy efficiency, nuclear, coal with carbon capture and sequestration, natural gas, and wind. Our results suggest that participants understood the tool and used it consistently. The tool may be downloaded from http://cedmcenter.org/tools-for-cedm/informing-the-public-about-low-carbon-technologies/ .
40 CFR 1.33 - Office of Administration and Resources Management.
Code of Federal Regulations, 2011 CFR
2011-07-01
... provides national program policy and technical guidance for: The acquisition of all information technology... acquired by grantees and contractors using Agency funds; the operation of all Agency computers and... Management Interns, OHRM establishes policies; assesses and projects Agency executive needs and workforce...
40 CFR 1.33 - Office of Administration and Resources Management.
Code of Federal Regulations, 2012 CFR
2012-07-01
... provides national program policy and technical guidance for: The acquisition of all information technology... acquired by grantees and contractors using Agency funds; the operation of all Agency computers and... Management Interns, OHRM establishes policies; assesses and projects Agency executive needs and workforce...
40 CFR 1.33 - Office of Administration and Resources Management.
Code of Federal Regulations, 2014 CFR
2014-07-01
... provides national program policy and technical guidance for: The acquisition of all information technology... acquired by grantees and contractors using Agency funds; the operation of all Agency computers and... Management Interns, OHRM establishes policies; assesses and projects Agency executive needs and workforce...
40 CFR 1.33 - Office of Administration and Resources Management.
Code of Federal Regulations, 2013 CFR
2013-07-01
... provides national program policy and technical guidance for: The acquisition of all information technology... acquired by grantees and contractors using Agency funds; the operation of all Agency computers and... Management Interns, OHRM establishes policies; assesses and projects Agency executive needs and workforce...
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology.
This document contains transcriptions of testimony and prepared statements on national technology policy with a focus on President Clinton and Vice President Gore's initiatives to support the development of a national information infrastructure. On the first day of the hearing testimony was received from Edward H. Salmon, Chairman, New Jersey…
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
COMPUTER-AIDED SCIENCE POLICY ANALYSIS AND RESEARCH (WEBCASPAR)
WebCASPAR is a database system containing information about academic science and engineering resources and is available on the World Wide Web. Included in the database is information from several of SRS's academic surveys plus information from a variety of other sources, includin...
Computer Competency of Nursing Students at a University in Thailand
ERIC Educational Resources Information Center
Niyomkar, Srimana
2012-01-01
During the past years, computer and information technology has been rapidly integrated into the education and healthcare fields. In the 21st century, computers are more powerful than ever, and are used in all aspects of nursing, including education, practice, policy, and research. Consequently, student nurses will need to utilize computer…
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
Technical change in US industry: A cross-industry analysis
NASA Technical Reports Server (NTRS)
Nelson, R. R. (Editor)
1981-01-01
The nature of the public policies which have influenced the pace and pattern of technical progress in a number of American industries is studied with the view of assessing the broad effects of these policies. The industries studied are agriculture, pharmaceuticals, semiconductors, computers, civil aircraft, automobiles and residential construction. The policies considered include research and development funding as well as government procurement, education, information dissemination, patent protection, licensing, regulations, and anti-trust policies.
The Information Highway: On Ramps, Checkpoints, and Tollbooths.
ERIC Educational Resources Information Center
Perritt, Henry H., Jr.
1996-01-01
Discusses how open computer network architecture, along with the browsing capabilities of the World Wide Web, facilitates the dissemination of public information. Competitive markets will be created as those from the private sector package electronic information with value added. Copyright law and information pricing policies are outlined, and…
Computer Science and Telecommunications Board summary of activities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blumenthal, M.S.
1992-03-27
The Computer Science and Telecommunications Board (CSTB) considers technical and policy issues pertaining to computer science, telecommunications, and associated technologies. CSTB actively disseminates the results of its completed projects to those in a position to help implement their recommendations or otherwise use their insights. It provides a forum for the exchange of information on computer science, computing technology, and telecommunications. This report discusses the major accomplishments of CSTB.
Computer Simulation of the Circulation Subsystem of a Library
ERIC Educational Resources Information Center
Shaw, W. M., Jr.
1975-01-01
When circulation data are used as input parameters for a computer simulation of a library's circulation subsystem, the results of the simulation provide information on book availability and delays. The model may be used to simulate alternative loan policies. (Author/LS)
78 FR 29113 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...). Agency: National Telecommunications and Information Administration (NTIA). Title: Computer and Internet... Communications Commission (FCC), and other stakeholders to develop and advance economic and regulatory policies... cost effective responses. NTIA proposes to add 53 questions in the Computer and Internet Use Supplement...
Policy revision in health enterprise information security: P3WG final report
NASA Astrophysics Data System (ADS)
Sostrom, Kristen; Collmann, Jeff R.
2003-05-01
Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.
Verification of Security Policy Enforcement in Enterprise Systems
NASA Astrophysics Data System (ADS)
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
Campus Computing 1990: The EDUCOM/USC Survey of Desktop Computing in Higher Education.
ERIC Educational Resources Information Center
Green, Kenneth C.; Eastman, Skip
The National Survey of Desktop Computer Use in Higher Education was conducted in the spring and summer of 1990 by the Center for Scholarly Technology at the University of Southern California, in cooperation with EDUCOM and with support from 15 corporate sponsors. The survey was designed to collect information about campus planning, policies, and…
Freight Transportation Information Systems and Their Implications for R&D Policy
DOT National Transportation Integrated Search
1974-03-01
The current use of computerized management information and control systems in intercity freight transportation are examined. Each of the four modes (railroad, motor carrier, maritime and air cargo industries) is investigated. In each case, computer i...
7 CFR 2.24 - Assistant Secretary for Administration.
Code of Federal Regulations, 2014 CFR
2014-01-01
... determining whether to continue, modify, or terminate an information technology program or project. (iii..., computer conferencing, televideo technologies, and other applications of office automation technology which... information technology system project managers in accordance with OMB policies. (D) Providing recommendations...
Information Systems; Modern Health Care and Medical Information.
ERIC Educational Resources Information Center
Brandejs, J. F., And Others
1975-01-01
To effectively handle changes in health policy and health information, new designs and applications of automation are explored. Increased use of computer-based information systems in health care could serve as a means of control over the costs of developing more comprehensive health service, with applications increasing not only the automation of…
Lauer, Michael S
2012-06-12
Policy and science often interact. Typically, we think of policymakers looking to scientists for advice on issues informed by science. We may appreciate less the opposite look: where people outside science inform policies that affect the conduct of science. In clinical medicine, we are forced to make decisions about practices for which there is insufficient, inadequate evidence to know whether they improve clinical outcomes, yet the health care system may not be structured to rapidly generate needed evidence. For example, when the Centers for Medicare and Medicaid Services noted insufficient evidence to support routine use of computed tomography angiography and they called for a national commitment to completion of randomized trials, their call ran into substantial opposition. I use the computed tomography angiography story to illustrate how we might consider a "policy for science" in which stakeholders would band together to identify evidence gaps and to use their influence to promote the efficient design, implementation, and completion of high-quality randomized trials. Such a policy for science could create a culture that incentivizes and invigorates the rapid generation of evidence, ultimately engaging all clinicians, all patients, and indeed all stakeholders into the scientific enterprise. Copyright © 2012 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.
Transborder Flow of Computerized Information: Controls and Restrictions.
ERIC Educational Resources Information Center
Shrader, Erwin
Of major concern to United States position and policy in the telecommunications and information areas is "transborder data flow," the transferring of computer stored data between nations. Many European nations, including France, Austria, and West Germany, have enacted laws regulating the flow of information leaving the country where it…
Internet and Information Control: The Case of China.
ERIC Educational Resources Information Center
Xiaoming, Hao; Zhang, Kewen; Yu, Huang
1996-01-01
Examines the potential impact of computer-mediated communication (CMC) on government controls of information in China. Examines the current development of CMC in China; challenges posed by new media technologies to government information control; and the current policy of the Chinese government towards on-line communication and its implications.…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and... classified national security information (classified information) on computer networks, it is hereby ordered as follows: Section 1. Policy. Our Nation's security requires classified information to be shared...
A Domain-Specific Language for Aviation Domain Interoperability
ERIC Educational Resources Information Center
Comitz, Paul
2013-01-01
Modern information systems require a flexible, scalable, and upgradeable infrastructure that allows communication and collaboration between heterogeneous information processing and computing environments. Aviation systems from different organizations often use differing representations and distribution policies for the same data and messages,…
7 CFR 2.89 - Chief Information Officer.
Code of Federal Regulations, 2011 CFR
2011-01-01
... continue, modify, or terminate an information technology program or project. (3) Provide advice and other..., computer conferencing, televideo technologies, and other applications of office automation technology which... technology system project managers in accordance with OMB policies. (iv) Providing recommendations to Agency...
7 CFR 2.89 - Chief Information Officer.
Code of Federal Regulations, 2012 CFR
2012-01-01
... continue, modify, or terminate an information technology program or project. (3) Provide advice and other..., computer conferencing, televideo technologies, and other applications of office automation technology which... technology system project managers in accordance with OMB policies. (iv) Providing recommendations to Agency...
The Information Inquisition: High Priests of Knowledge
ERIC Educational Resources Information Center
Engle, Randall K.
2008-01-01
In this paper the author examines the relationships between the educational technology movement, the computer industry, the administration's education policies, and the Inquisition. Examples of ways in which information is manipulated, distorted, and denied public scrutiny are discussed. (Contains 1 table.)
Information visualisation for science and policy: engaging users and avoiding bias.
McInerny, Greg J; Chen, Min; Freeman, Robin; Gavaghan, David; Meyer, Miriah; Rowland, Francis; Spiegelhalter, David J; Stefaner, Moritz; Tessarolo, Geizi; Hortal, Joaquin
2014-03-01
Visualisations and graphics are fundamental to studying complex subject matter. However, beyond acknowledging this value, scientists and science-policy programmes rarely consider how visualisations can enable discovery, create engaging and robust reporting, or support online resources. Producing accessible and unbiased visualisations from complicated, uncertain data requires expertise and knowledge from science, policy, computing, and design. However, visualisation is rarely found in our scientific training, organisations, or collaborations. As new policy programmes develop [e.g., the Intergovernmental Platform on Biodiversity and Ecosystem Services (IPBES)], we need information visualisation to permeate increasingly both the work of scientists and science policy. The alternative is increased potential for missed discoveries, miscommunications, and, at worst, creating a bias towards the research that is easiest to display. Copyright © 2014 Elsevier Ltd. All rights reserved.
Attribute based encryption for secure sharing of E-health data
NASA Astrophysics Data System (ADS)
Charanya, R.; Nithya, S.; Manikandan, N.
2017-11-01
Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.
Assessing Affordances of Selected Cloud Computing Tools for Language Teacher Education in Nigeria
ERIC Educational Resources Information Center
Ofemile, Abdulmalik Yusuf
2015-01-01
This paper reports part of a study that hoped to understand Teacher Educators' (TE) assessment of the affordances of selected cloud computing tools ranked among the top 100 for the year 2010. Research has shown that ICT and by extension cloud computing has positive impacts on daily life and this informed the Nigerian government's policy to…
Computer-Assisted Community Planning and Decision Making.
ERIC Educational Resources Information Center
College of the Atlantic, Bar Harbor, ME.
The College of the Atlantic (COA) developed a broad-based, interdisciplinary curriculum in ecological policy and community planning and decision-making that incorporates two primary computer-based tools: ARC/INFO Geographic Information System (GIS) and STELLA, a systems-dynamics modeling tool. Students learn how to use and apply these tools…
Developing an Academic Information Resources Master Plan: A Paradigm.
ERIC Educational Resources Information Center
Gentry, H. R.
Since 1980, Johnson County Community College (JCCC) has rapidly expanded its use of personal computers in instruction and administration. Many computers were being acquired, however, before appropriate policies, plans, and procedures were developed for their effective management. In response to this problem, the following actions were identified…
28 CFR 0.75 - Policy functions.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., automated information services, publication services, library services and any other Department-wide central...) Provide computer and digital telecommunications services on an equitable resource-sharing basis to all...
28 CFR 0.75 - Policy functions.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., automated information services, publication services, library services and any other Department-wide central...) Provide computer and digital telecommunications services on an equitable resource-sharing basis to all...
The Terry-Wiseman Security Policy Model and Examples of Its Use
1990-03-01
Wiseman Security Policy Model and Examples of Its Use Author: C L Harrold Date: March 1990 Abstract This paper presents a model of security for computer ...Evolution of the Model 7. Summary and References Annex: An Overviev , of the Z N-,,tion Ace5sston For N?.1S (tRA&1DTIC TM-, [ U mr, ),inced El ,v l I...a computer . The files, objects or register locations in which the information may be stored are modelled by the black boxes. The robots model the
Information specialist for a coming age (12)
NASA Astrophysics Data System (ADS)
Iinuma, Mitsuo
Since we entered the advanced information society, information activities infiltrated into every aspect of our life such as economy and daily life. In this circumstances, business management is now going to change in its way and policy. Especially, globalization of business activities and shifting to service business have brought a new aspect into the information activities in the business, which has now become a fundamental activity in business management. The new technology of computer and telecommunication network played a key role, and brought electronic information, which was a new type of management information. The electronic information with intellectual property has become valuable as a new resources to be marketable, as well as by its usefulness as management information. Thus, businesses will have to change their policies concerning information from "managing information" to "managing by information."
An Exploration of Turnover Experience of IT Professionals in the District of Columbia
ERIC Educational Resources Information Center
Edeh, George
2016-01-01
Turnover among information technology professionals costs organization in revenues. According to Computer Economics (2008), the cost of replacing one information technology employee is $50,000. Reports from the United States Department of Commerce and Office of Technology Policy showed that turnover rate in Information Technology has exceeded 20%…
A computer science approach to managing security in health care.
Asirelli, P; Braccini, G; Caramella, D; Coco, A; Fabbrini, F
2002-09-01
The security of electronic medical information is very important for health care organisations, which have to ensure confidentiality, integrity and availability of the information provided. This paper will briefly outline the legal measures adopted by the European Community, Italy and the United States to regulate the use and disclosure of medical records. It will then go on to highlight how information technology can help to address these issues with special reference to the management of organisation policies. To this end, we will present a modelling example for the security policy of a radiological department.
Proceedings of a Conference on Telecommunication Technologies, Networkings and Libraries
NASA Astrophysics Data System (ADS)
Knight, N. K.
1981-12-01
Current and developing technologies for digital transmission of image data likely to have an impact on the operations of libraries and information centers or provide support for information networking are reviewed. Technologies reviewed include slow scan television, teleconferencing, and videodisc technology and standards development for computer network interconnection through hardware and software, particularly packet switched networks computer network protocols for library and information service applications, the structure of a national bibliographic telecommunications network; and the major policy issues involved in the regulation or deregulation of the common communications carriers industry.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Science and Technology.
Hearings on the use of computer technology in the health care field are presented to provide information needed by Congress and the Food and Drug Administration to make future policies. Medical computing systems can make interpretations of data on the patient's health and can generate diagnostic recommendations to the physician. Included are…
Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.
ERIC Educational Resources Information Center
Telecommunications Policy Research Conference, Inc., Washington, DC.
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
Data Security Policy | High-Performance Computing | NREL
to use its high-performance computing (HPC) systems. NREL HPC systems are operated as research systems and may only contain data related to scientific research. These systems are categorized as low per sensitive or non-sensitive. One example of sensitive data would be personally identifiable information (PII
ERIC Educational Resources Information Center
Cleveland, Lara L.
2011-01-01
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
ANL site response for the DOE FY1994 information resources management long-range plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boxberger, L.M.
1992-03-01
Argonne National Laboratory`s ANL Site Response for the DOE FY1994 Information Resources Management (IRM) Long-Range Plan (ANL/TM 500) is one of many contributions to the DOE information resources management long-range planning process and, as such, is an integral part of the DOE policy and program planning system. The Laboratory has constructed this response according to instructions in a Call issued in September 1991 by the DOE Office of IRM Policy, Plans and Oversight. As one of a continuing series, this Site Response is an update and extension of the Laboratory`s previous submissions. The response contains both narrative and tabular material.more » It covers an eight-year period consisting of the base year (FY1991), the current year (FY1992), the budget year (FY1993), the plan year (FY1994), and the out years (FY1995-FY1998). This Site Response was compiled by Argonne National Laboratory`s Computing and Telecommunications Division (CTD), which has the responsibility to provide leadership in optimizing computing and information services and disseminating computer-related technologies throughout the Laboratory. The Site Response consists of 5 parts: (1) a site overview, describes the ANL mission, overall organization structure, the strategic approach to meet information resource needs, the planning process, major issues and points of contact. (2) a software plan for DOE contractors, Part 2B, ``Software Plan FMS plan for DOE organizations, (3) computing resources telecommunications, (4) telecommunications, (5) printing and publishing.« less
ANL site response for the DOE FY1994 information resources management long-range plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boxberger, L.M.
1992-03-01
Argonne National Laboratory's ANL Site Response for the DOE FY1994 Information Resources Management (IRM) Long-Range Plan (ANL/TM 500) is one of many contributions to the DOE information resources management long-range planning process and, as such, is an integral part of the DOE policy and program planning system. The Laboratory has constructed this response according to instructions in a Call issued in September 1991 by the DOE Office of IRM Policy, Plans and Oversight. As one of a continuing series, this Site Response is an update and extension of the Laboratory's previous submissions. The response contains both narrative and tabular material.more » It covers an eight-year period consisting of the base year (FY1991), the current year (FY1992), the budget year (FY1993), the plan year (FY1994), and the out years (FY1995-FY1998). This Site Response was compiled by Argonne National Laboratory's Computing and Telecommunications Division (CTD), which has the responsibility to provide leadership in optimizing computing and information services and disseminating computer-related technologies throughout the Laboratory. The Site Response consists of 5 parts: (1) a site overview, describes the ANL mission, overall organization structure, the strategic approach to meet information resource needs, the planning process, major issues and points of contact. (2) a software plan for DOE contractors, Part 2B, Software Plan FMS plan for DOE organizations, (3) computing resources telecommunications, (4) telecommunications, (5) printing and publishing.« less
32 CFR 505.1 - General information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.1 General information. (a) Purpose. This part sets forth policies... Relating to Individual Persons, November 30, 1943. (9) Public Law 100-503, the Computer Matching and...
Information System for Educational Policy and Administration.
ERIC Educational Resources Information Center
Clayton, J. C., Jr.
Educational Information System (EIS) is a proposed computer-based data processing system to help schools solve current educational problems more efficiently. The system would allow for more effective administrative operations in student scheduling, financial accounting, and long range planning. It would also assist school trustees and others in…
ERIC Educational Resources Information Center
Neal, James G.
1999-01-01
Examines the changes that are affecting academic library collection development. Highlights include computer technology; digital information; networking; virtual reality; hypertext; fair use and copyrights; technological infrastructure; digital libraries; information policy; academic and scholarly publishing; and experiences at the Johns Hopkins…
ERIC Educational Resources Information Center
Angus, Lawrence; Snyder, Ilana; Sutherland-Smith, Wendy
2004-01-01
Because access to new technologies is unequally distributed, there has been considerable debate about the growing gap between the so-called information-rich and information-poor. Such concerns have led to high-profile information technology policy initiatives in many countries. In Australia, in an attempt to 'redress the balance between the…
Reflecting on the ethical administration of computerized medical records
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.
1995-05-01
This presentation examines the ethical issues raised by computerized image management and communication systems (IMAC), the ethical principals that should guide development of policies, procedures and practices for IMACS systems, and who should be involved in developing a hospital's approach to these issues. The ready access of computerized records creates special hazards of which hospitals must beware. Hospitals must maintain confidentiality of patient's records while making records available to authorized users as efficiently as possible. The general conditions of contemporary health care undermine protecting the confidentiality of patient record. Patients may not provide health care institutions with information about themselves under conditions of informed consent. The field of information science must design sophisticated systems of computer security that stratify access, create audit trails on data changes and system use, safeguard patient data from corruption, and protect the databases from outside invasion. Radiology professionals must both work with information science experts in their own hospitals to create institutional safeguards and include the adequacy of security measures as a criterion for evaluating PACS systems. New policies and procedures on maintaining computerized patient records must be developed that obligate all members of the health care staff, not just care givers. Patients must be informed about the existence of computerized medical records, the rules and practices that govern their dissemination and given the opportunity to give or withhold consent for their use. Departmental and hospital policies on confidentiality should be reviewed to determine if revisions are necessary to manage computer-based records. Well developed discussions of the ethical principles and administrative policies on confidentiality and informed consent and of the risks posed by computer-based patient records systems should be included in initial and continuing staff system training. Administration should develop ways to monitor staff compliance with confidentiality policies and should assess diligence in maintaining patient record confidentiality as part of staff annual performance evaluations. Ethical management of IMAC systems is the business of all members of the health care team. Computerized patient records management (including IMAC) should be scrutinized as any other clinical medial ethical issue. If hospitals include these processes in their planning for RIS, IMACS, and HIS systems, they should have time to develop institutional expertise on these questions before and as systems are installed rather than only as ethical dilemmas develop during their use.
Final Report: PAGE: Policy Analytics Generation Engine
2016-08-12
develop a parallel framework for it. We also developed policies and methods by which a group of defensive resources (e.g. checkpoints) could be...Sarit Kraus. Learning to Reveal Information in Repeated Human -Computer Negotiation, Human -Agent Interaction Design and Models Workshop 2012. 04-JUN...Joseph Keshet, Sarit Kraus. Predicting Human Strategic Decisions Using Facial Expressions, International Joint Conference on Artificial
Information Computer Communications Policy, 2: The Usage of International Data Networks in Europe.
ERIC Educational Resources Information Center
Organisation for Economic Cooperation and Development, Paris (France).
This study of the development of international data networks, a phenomena of the 1970's, and policy issues arising from their use is an in depth investigation of 24 private and six public European networks commissioned from Logica Limited and sponsored by the governments of France, Germany, the Netherlands, Norway, Spain, and Sweden. The report…
ERIC Educational Resources Information Center
Hartmann, Heidi I., Ed.; And Others
This volume contains 12 papers commissioned by the Panel on Technology and Women's Employment. "Technology, Women, and Work: Policy Perspectives" (Eli Ginzberg) is an overview that provides a context for the volume. The four case studies in Part II describe the impact of information technology in the insurance industry, among bookkeepers, among…
Transborder Data Flow, Informatics and National Policies: A Comparison among 22 Nations.
ERIC Educational Resources Information Center
Wigand, Rolf T.; And Others
The product of advanced information technology and digital transmission capabilities, transborder data flow (TDF)--the flow of information across national borders via computer and other electronic communications systems--has considerable political, social, economic, and legal implications. Important issues in TDF include (1) the regulation of…
Systems Management of Air Force Standard Communications-Computer systems: There is a Better Way
1988-04-01
upgrade or replacement of systems. AFR 700-6, Information Systems Operation Management , AFR 700-7, Information Processing Center Opera- tions Management...and AFR 700-8, Telephone Systems Operation Management provide USAF guidance, policy and procedures governing this phase. 4 2. 800-Series Regulations
Guidelines for the Development of Computerized Student Information Systems.
ERIC Educational Resources Information Center
Armes, Nancy, Ed.; And Others
Designed to provide guidelines for the development of computerized student information systems, this report raises policy issues and questions to be resolved at the campus level and describes a variety of computer-generated reports and records that can assist in educational decision making and planning. Introductory material discusses the…
NASA Technical Reports Server (NTRS)
Brown, Molly E.; Macauley, Molly
2012-01-01
Climate policy in the United States is currently guided by public-private partnerships and actions at the local and state levels. This mitigation strategy is made up of programs that focus on energy efficiency, renewable energy, agricultural practices and implementation of technologies to reduce greenhouse gases. How will policy makers know if these strategies are working, particularly at the scales at which they are being implemented? The NASA Carbon Monitoring System (CMS) will provide information on carbon dioxide fluxes derived from observations of earth's land, ocean and atmosphere used in state of the art models describing their interactions. This new modeling system could be used to assess the impact of specific policy interventions on CO2 reductions, enabling an iterative, results-oriented policy process. In January of 2012, the CMS team held a meeting with carbon policy and decision makers in Washington DC to describe the developing modeling system to policy makers. The NASA CMS will develop pilot studies to provide information across a range of spatial scales, consider carbon storage in biomass, and improve measures of the atmospheric distribution of carbon dioxide. The pilot involves multiple institutions (four NASA centers as well as several universities) and over 20 scientists in its work. This pilot study will generate CO2 flux maps for two years using observational constraints in NASA's state-of -the-art models. Bottom-up surface flux estimates will be computed using data-constrained land and ocean models; comparison of the different techniques will provide some knowledge of uncertainty in these estimates. Ensembles of atmospheric carbon distributions will be computed using an atmospheric general circulation model (GEOS-5), with perturbations to the surface fluxes and to transport. Top-down flux estimates will be computed from observed atmospheric CO2 distributions (ACOS/GOSAT retrievals) alongside the forward-model fields, in conjunction with an inverse approach based on the CO2 model of GEOS ]Chem. The forward model ensembles will be used to build understanding of relationships among surface flux perturbations, transport uncertainty and atmospheric carbon concentration. This will help construct uncertainty estimates and information on the true spatial resolution of the top-down flux calculations. The relationship between the top-down and bottom-up flux distributions will be documented. Because the goal of NASA CMS is to be policy relevant, the scientists involved in the flux modeling pilot need to understand and be focused on the needs of the climate policy and decision making community. If policy makers are to use CMS products, they must be aware of the modeling effort and begin to design policies that can be evaluated with information. Improving estimates of carbon sequestered in forests, for example, will require information on the spatial variability of forest biomass that is far more explicit than is presently possible using only ground observations. Carbon mitigation policies being implemented by cities around the United States could be designed with the CMS data in mind, enabling sequential evaluation and subsequent improvements in incentives, structures and programs. The success of climate mitigation programs being implemented in the United States today will hang on the depth of the relationship between scientists and their policy and decision making counterparts. Ensuring that there is two-way communication between data providers and users is important for the success both of the policies and the scientific products meant to support them..
Business School Computer Usage, Fourth Annual UCLA Survey.
ERIC Educational Resources Information Center
Frand, Jason L.; And Others
The changing nature of the business school computing environment is monitored in a report whose purpose is to provide deans and other policy-makers with information to use in making allocation decisions and program plans. This survey focuses on resource allocations of 249 accredited U.S. business schools and 15 Canadian schools. A total of 128…
ERIC Educational Resources Information Center
European Commission, 2014
2014-01-01
The 2013 European Commission Communication on Opening up Education underlined the importance of solid evidence to assess developments and take full advantage of the impact of technology on education, and called for sustained effort and international cooperation to improve our knowledge-base in this area. The International Computer and Information…
Computers and Classrooms: The Status of Technology in U.S. Schools. Policy Information Report.
ERIC Educational Resources Information Center
Coley, Richard; Cradler, John; Engel, Penelope K.
The purpose of this report is to provide a "snapshot" of the status of technology use in United States schools. The report focuses on the following: school access to technology; student use of computers; evaluating the impact of educational technology; connecting teachers and technology; assessing the content and quality of courseware;…
Seidel, Bastian M; Bell, Erica
2014-11-28
Many countries are developing or reviewing national adaptation policy for climate change but the extent to which these meet the health needs of vulnerable groups has not been assessed. This study examines the adequacy of such policies for nine known climate-vulnerable groups: people with mental health conditions, Aboriginal people, culturally and linguistically diverse groups, aged people, people with disabilities, rural communities, children, women, and socioeconomically disadvantaged people. The study analyses an exhaustive sample of national adaptation policy documents from Annex 1 ('developed') countries of the United Nations Framework Convention on Climate Change: 20 documents from 12 countries. A 'critical computational linguistics' method was used involving novel software-driven quantitative mapping and traditional critical discourse analysis. The study finds that references to vulnerable groups are relatively little present or non-existent, as well as poorly connected to language about practical strategies and socio-economic contexts, both also little present. The conclusions offer strategies for developing policy that is better informed by a 'social determinants of health' definition of climate vulnerability, consistent with best practice in the literature and global policy prescriptions.
Security & Privacy Policy - Naval Oceanography Portal
Notice: This is a U.S. Government Web Site 1. This is a World Wide Web site for official information information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Information Act (FOIA) | External Link Disclaimer This is an official U.S. Navy web site. Security &
Trust Information and Privacy Policies - Enablers for pHealth and Ubiquitous Health.
Ruotsalainen, Pekka; Blobel, Bernd
2014-01-01
pHealth occurs in uncontrolled and unsecure environment where predefined organizational trust does not exist. To be accepted by users, pHealth requires a privacy model where privacy is a personal property, i.e., a person can perform own will and define policies which regulate how personal health information (PHI) is used. Privacy and trust are interconnected concepts. Therefore, before beginning to use pHealth services, the person needs practical and reliable information that enables her or him to determine the trustworthiness level of services. To avoid the use of blind trust, organizations, researchers, policymakers, and standardization organizations have proposed the use of dynamic context-aware policies for privacy management in pHealth. To make meaningful privacy decision, a person should understand the impact of selected policy rules on the processing of PHI in different situations. In this paper, the use of computational trust information for defining privacy polies and reducing their number is proposed. A trust value and understandable trust attributes enable a person to tailor privacy policies requested for trustworthy use of pHealth services. Trust attributes proposed are derived from privacy concerns existing in open ubiquitous environment. These attributes also force pHealth services providers to publish information needed for trust calculation and in this way to support openness and transparency.
ERIC Educational Resources Information Center
Office of Science and Technology Policy, Washington, DC.
In this report, the National Information Infrastructure (NII) services issue is addressed, and activities to advance the development of NII services are recommended. The NII is envisioned to grow into a seamless web of communications networks, computers, databases, and consumer electronics that will put vast amounts of information at users'…
Micro-Electronics, Robotics and Jobs. Information Computer Communication Policy Series No. 7.
ERIC Educational Resources Information Center
Organisation for Economic Cooperation and Development, Paris (France).
This monograph contains selected papers presented at the Second Special Session on Information Technologies, Productivity and Labour Market Implications, which took place at the Organisation for Economic Cooperation and Development on October 19-21, 1981. An introductory note summarizes significant points from the meeting. Part 1 contains a report…
ERIC Educational Resources Information Center
Oden, Michael; Strover, Sharon
This report documents the status of information, computing, and telecommunications (ICT) technologies in the Appalachian region, assessing their potential relationship to economic growth and the federal, state, and local policies that influence their development. Key findings include the following. Leading producers of ICT products and services…
AdaMeasure: An Implementation of the Halstead and Henry Metrics.
1987-06-01
of Departne t o Computer Science Kneale T..Nar4 ___. Dean of Information and Policy bScic:-n-- 2 Allr ABSTRACT I A software metric is a tool that...CONTENTS INTRODUCTION AND BACKGROUND ......................... 6 A. DEFINITIONS ..................................................... 6 B. SALLIE HENRY’S...METRIC.................................... 6 C. INFORMATION FLOW .......................................... 7 D. RELATIONS
Training New Admissions Recruiters: A Guide for Survival and Success.
ERIC Educational Resources Information Center
Swanson, Roger M.; Wilkinson, Christine Kajikawa
This volume is a guide for new college admissions recruiters and their supervisors. Chapter 1 discusses office space and related policy and telephone and computer equipment use as well as other important practical information. Chapter 2 discusses the recruiter's duty to become completely informed about his/her institution in various categories.…
Code of Federal Regulations, 2012 CFR
2012-07-01
... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...
Code of Federal Regulations, 2013 CFR
2013-07-01
... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...
Code of Federal Regulations, 2014 CFR
2014-07-01
... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...
Computer Skills and Digital Media Uses among Young Students in Rio de Janeiro
ERIC Educational Resources Information Center
Duarte, Rosalia; Cazelli, Sibele; Migliora, Rita; Coimbra, Carlos
2013-01-01
The main purpose of this paper is provide information relevant for the formulation of new policies for the integration of technology in education from the discussion of research results that analyse computer skills and digital media uses among students (between 12 to 18 years old) from schools in the city of Rio de Janeiro, Brazil. The schools…
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E.; Barclay, Rebecca O.; Bishop, Ann P.; Kennedy, John M.
1992-01-01
Federal attempts to stimulate technological innovation have been unsuccessful because of the application of an inappropriate policy framework that lacks conceptual and empirical knowledge of the process of technological innovation and fails to acknowledge the relationship between knowled reproduction, transfer, and use as equally important components of the process of knowledge diffusion. It is argued that the potential contributions of high-speed computing and networking systems will be diminished unless empirically derived knowledge about the information-seeking behavior of the members of the social system is incorporated into a new policy framework. Findings from the NASA/DoD Aerospace Knowledge Diffusion Research Project are presented in support of this assertion.
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E.; Barclay, Rebecca O.; Bishop, Ann P.; Kennedy, John M.
1992-01-01
Federal attempts to stimulate technological innovation have been unsuccessful because of the application of an inappropriate policy framework that lacks conceptual and empirical knowledge of the process of technological innovation and fails to acknowledge the relationship between knowledge production, transfer, and use as equally important components of the process of knowledge diffusion. This article argues that the potential contributions of high-speed computing and networking systems will be diminished unless empirically derived knowledge about the information-seeking behavior of members of the social system is incorporated into a new policy framework. Findings from the NASA/DoD Aerospace Knowledge Diffusion Research Project are presented in support of this assertion.
The Structure of the Computer Industry
1992-03-01
the user and written for pay by employees . The entry of computing power into mass markets and the emergence of the software industry in the late 1970s...use of improper means, there would be difficulties in acquiring the information.. .Protection is not based on a policy of rewarding or otherwise 74...2). In the computer industry, the most frequently litigated trade secret case occurs when an employee who has access to an employer’s trade secrets
Dynamic Enforcement of Knowledge-based Security Policies
2011-04-05
foster and maintain relationships by sharing information with friends and fans. These services store users’ personal information and use it to customize...Facebook selects ads based on age, gender, and even sexual preference [2]. Unfortunately, once personal information is collected, users have limited...could use a storage server (e.g., running on their home network) that handles personal † University of Maryland, Department of Computer Science
ERIC Educational Resources Information Center
Aspen Inst., Queenstown, MD.
In a workshop held by the National Research Council through their Board on Telecommunications and Computer Applications, the participants determined that the earlier vision of affordable telephone service for all, already fundamentally achieved in the United States, can be extended to a new national policy of affordable information for all. This…
Individual privacy in an information dependent society
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clifford, B.P.
1994-12-31
The extraordinary technologies and capabilities of the Information Age have vastly improved communication, while allowing executives to have ultra-current information about their companies, subsidiaries, staff, clients, and practically any individual in the world. These advances, however, have stripped the individual of his privacy. Although invasions of privacy do not require a computer, computers have made it much easier to gather and select informatin, which means that it is also much easier to invade privacy. The increased value of information to policy makers leads them to covet information, even when acquiring it invades someone`s pricacy; not only do managers of privatemore » companies gather personal data, almost every citizen has files about him in Federal agencies and administrations.« less
76 FR 78327 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-16
... security and law enforcement access issues related to cloud computing, as well as recent private sector.... Visitor's full name. 3. Date of birth. 4. Citizenship. 5. Acceptable forms of identification for entry...
... already registered, you will receive periodic updates and communications from American Brain Tumor Association. Keep me logged in. What's this? Remembers your login information for your convenience. Use only on trusted, private computers. Privacy Policy Spam Control Text: Please leave this ...
... already registered, you will receive periodic updates and communications from American Brain Tumor Association. Keep me logged in. What's this? Remembers your login information for your convenience. Use only on trusted, private computers. Privacy Policy Spam Control Text: Please leave this ...
Study of the Use of Ada in Trusted Computing Bases (TCBs) to be Certified at, or Below, the B3 Level
1989-04-01
of th . Each M class, fran Cl throh B3, is described. nTe tor ajor steadings of TcBs, Security policy , Acxntability, Ass-ranre, and D Mnt.Iticn, am...the system’s security policy . Data - Information with a specific physical representation. Discreticnary A C Itrol - A means of restricting access to...including hardware firmware, and software - the cambination of which is responsible for enforcing a security policy . A TCB consists of one or more
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
Asia-Pacific POPIN workshop on Internet.
1996-01-01
This brief article announces the accomplishments of the ESCAP Population Division of the Department of Economic and Social Information and Policy Analysis (DESIPA) in conjunction with the Asia-Pacific POPIN Internet (Information Superhighway) Training Workshop in popularizing useful new computer information technologies. A successful workshop was held in Bangkok in November 1996 for 18 people from 8 countries in the Asian and Pacific region, many of whom were from population information centers. Participants were taught some techniques for disseminating population data and information through use of the Internet computer facility. Participants learned 1) how to use Windows software in the ESCAP local area network (LAN), 2) about concepts such as HTML (hypertext mark-up language), and 3) detailed information about computer language. Computer practices involved "surfing the Net (Internet)" and linking with the global POPIN site on the Internet. Participants learned about computer programs for information handling and learned how to prepare documents using HTML, how to mount information on the World Wide Web (WWW) of the Internet, how to convert existing documents into "HTML-style" files, and how to scan graphics, such as logos, photographs, and maps, for visual display on the Internet. The Workshop and the three training modules was funded by the UN Population Fund (UNFPA). The POPIN Coordinator was pleased that competency was accomplished in such a short period of time.
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
Workflow computing. Improving management and efficiency of pathology diagnostic services.
Buffone, G J; Moreau, D; Beck, J R
1996-04-01
Traditionally, information technology in health care has helped practitioners to collect, store, and present information and also to add a degree of automation to simple tasks (instrument interfaces supporting result entry, for example). Thus commercially available information systems do little to support the need to model, execute, monitor, coordinate, and revise the various complex clinical processes required to support health-care delivery. Workflow computing, which is already implemented and improving the efficiency of operations in several nonmedical industries, can address the need to manage complex clinical processes. Workflow computing not only provides a means to define and manage the events, roles, and information integral to health-care delivery but also supports the explicit implementation of policy or rules appropriate to the process. This article explains how workflow computing may be applied to health-care and the inherent advantages of the technology, and it defines workflow system requirements for use in health-care delivery with special reference to diagnostic pathology.
Working towards a national health information system in Australia.
Bomba, B; Cooper, J; Miller, M
1995-01-01
One of the major administrative dilemmas facing the Australian national health care system is the need to reform practices associated with massive data-information overload. The current system is burdened with paper-based administrative forms, patient record files, referral notes and other manual methods of data organisation. An integrated computer-based information system may be perceived as an attractive solution to such burdens. However, computerisation must not be seen as a panacea with the possibility of exacerbating information overload and accentuating privacy concerns. Recent surveys in Australia [1] and the US [2] indicate a perceived causal link between computers and privacy invasion. Any moves toward a national health information system must counter this perception through macro-level education schemes of affected parties and micro-level mechanisms such as the establishment of hospital privacy officers. Such concerns may be viewed as a subset of the wider privacy debate, and information policy development should address such considerations to develop policies to prevent unauthorized access to personal information and to avoid the extraction and sale of sensitive health data. Conservative in nature and slow to change the health care sector may be forced to adopt more efficient work practices through the increasing proliferation of information technology (IT) in health care delivery and an escalating emphasis upon accountability and efficiency of the public health care dollar. The economic rationalist stance taken by governments in Australia and other nations generally will also force health care workers to adopt and develop more efficient information management practices, health indicators and best practice care methods than presently employed by this sector The benefits of a national health information system are far reaching, particularly in developing a more effective health care system through better identifying and understanding community health care trends and in applying IT to the efficient collection of data for the development of more appropriate performance measures and statistical indicators. A coherent and integrated approach is called for in the design of a national health information system which incorporates the necessary and requisite security features to meet privacy concerns. Protecting information privacy poses complex political, economic, technological, legal and social problems for systems developers and health care providers alike [2]. According to Brannigan [3] there are three components involved in the formulation and implementation of privacy: public policy (What level of privacy does society want?); legal structure (Does the law adequately provide for society's privacy requirements?); and technical (how much privacy can technical tools provide, at what cost, and with what effects on the system?). Examining technical tools alone, it is apparent that the necessary technologies are available in Australia to provide the security of medical records required by public policy. Such tools may include encryption, user and data authentication methods, authorisation schemes and mechanisms for the prevention of data inference. While none of these available measures are infallible, it is suitable for most applications where the encryption mechanism can provide protection for a given length of time. Australia needs to develop a coherent national health information infrastructure policy to ultimately avoid fragmented, duplicated and incompatible systems that rely on different standards and protocols. Such a policy will only work by addressing the key issue of patient privacy within a technological framework. The application of IT to health care systems is a sensitive social experiment affecting many professions including general practitioners, medical administrators, politicians, lawyers, computer specialists, privacy advocates and patients whose records will ultimately reside in the system. (abstract trun
JPRS Report, Science & Technology, China.
1992-12-08
impor- tance of the computer information industry to the develop- ment of the national economy and the people’s standard of living. Forecasts call...past several years, and the application of computers has permeated every trade and industry , providing powerful SCIENCE & TECHNOLOGY POLICY JPRS...system and ample human talent; market potential is large; and it has potential for low cost develop- ment. However, the scale of its industrial
RELIABLE COMPUTATION OF REACTIVE AZEOTROPES. (R826734)
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
RELIABLE COMPUTATION OF MIXTURE CRITICAL POINTS. (R826734)
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
Impact of information and communication technology on child health.
Woo, Eugenia Hc; White, Peter; Lai, Christopher Wk
2016-06-01
This article provides a general framework for understanding the use of information and communication technology in education and discusses the impact of computer usage on students' health and development. Potential beneficial and harmful effects of computer use by children are discussed. Early epidemiological and laboratory studies have indicated that children are at least of similar risk of developing musculoskeletal and vision problems as adults, and musculoskeletal and visual health problems developed in childhood are likely to persist into adulthood. This article, therefore, aims to provide a reflection on the deficits of existing policy and recommendations for child-specific guidelines in computer use. © 2016 Paediatrics and Child Health Division (The Royal Australasian College of Physicians).
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
A Holistic Approach to Networked Information Systems Design and Analysis
2016-04-15
attain quite substantial savings. 11. Optimal algorithms for energy harvesting in wireless networks. We use a Markov- decision-process (MDP) based...approach to obtain optimal policies for transmissions . The key advantage of our approach is that it holistically considers information and energy in a...Coding technique to minimize delays and the number of transmissions in Wireless Systems. As we approach an era of ubiquitous computing with information
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-01-01
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-09-03
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.
SOME MATHEMATICAL AND COMPUTATIONAL PROBLEMS IN REACTIVE FLOW. (R827116)
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
The Telecommunications Environment and Its Implications for System Design.
ERIC Educational Resources Information Center
Learn, Larry L.; McGill, Michael J.
1984-01-01
Discusses changing telecommunications environment and effect these changes might have on information systems design. Major telecommunications factors and trends reviewed are classified as technical (application of computer technologies to classical telecommunications problems), economic, and regulatory policy related (divestiture of American…
Pilot study of the domestic information display system in state and local government
NASA Technical Reports Server (NTRS)
1982-01-01
An interactive computer based system that can retrieve a wide range of data (demographic, environmental, socio-economic, etc.,) from a large data base and display these data for different geographic units in the form of choropleth maps was developed. The system was designed to display statistical information in a geographic format for national policy makers.
A Risk Management Approach to the "Insider Threat"
NASA Astrophysics Data System (ADS)
Bishop, Matt; Engle, Sophie; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policyin a form that can be implemented on a computer system or network, createsgaps in enforcement. This paper defines "insider" precisely, in termsof thesegaps, andexploresan access-based modelfor analyzing threats that include those usually termed "insider threats." This model enables an organization to order its resources based on thebusinessvalue for that resource andof the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which usersareatthe greatestriskofacting inappropriately. We concludebyexamining how to merge this model with one of forensic logging and auditing.
Continuity of Operations Plans: Policy and Strategy for K-12 Schools in the State of Florida
2011-12-01
issue that has emerged, as it concerns COOP, involves the need for Florida K-12 school systems to develop these plans. Florida neither requires, as is...test COOPs to ensure functional and recovery capabilities. Issues , such as alternate facilities, computer and informational services, as well as human...policy and strategy components for K-12 schools. D. HYPOTHESIS Within the communities of government, universities and businesses , a COOP has
SOME STATISTICAL TOOLS FOR EVALUATING COMPUTER SIMULATIONS: A DATA ANALYSIS. (R825381)
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
Code of Federal Regulations, 2011 CFR
2011-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2010 CFR
2010-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
ERIC Educational Resources Information Center
Abbott, George L.; And Others
1987-01-01
This special feature focuses on recent developments in optical disk technology. Nine articles discuss current trends, large scale image processing, data structures for optical disks, the use of computer simulators to create optical disks, videodisk use in training, interactive audio video systems, impacts on federal information policy, and…
Code of Federal Regulations, 2013 CFR
2013-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2014 CFR
2014-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2012 CFR
2012-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
75 FR 45134 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... information and computer science and technology to public health practice, research and learning. PHITPO... informatics solutions with health IT policies and translating emerging science, research and learning into... health sciences to improve population health through research, consultation, practice, training...
Tengilimoğlu, Dilaver; Celik, Yusuf; Ulgü, Mahir
2006-08-01
The main purpose of this study is to give an idea to the readers about how big and important the computing and information problems that hospital managers as well as policy makers will face with after collecting the Ministry of Labor and Social Security (MoLSS) and Ministry of Health (MoH) hospitals under single structure in Turkey by comparing the current level of computing capability of hospitals owned by two ministries. The data used in this study were obtained from 729 hospitals that belong to both ministries by using a data collection tool. The results indicate that there have been considerable differences among the hospitals owned by the two ministries in terms of human resources and information systems. The hospital managers and decision makers making their decisions based on the data produced by current hospital information system (HIS) would more likely face very important difficulties after merging MoH and MoLSS hospitals in Turkey. It is also possible to claim that the level and adequacy of computing abilities and devices do not allow the managers of public hospitals to use computer technology effectively in their information management practices. Lack of technical information, undeveloped information culture, inappropriate management styles, and being inexperienced are the main reasons of why HIS does not run properly and effectively in Turkish hospitals.
On the design of computer-based models for integrated environmental science.
McIntosh, Brian S; Jeffrey, Paul; Lemon, Mark; Winder, Nick
2005-06-01
The current research agenda in environmental science is dominated by calls to integrate science and policy to better understand and manage links between social (human) and natural (nonhuman) processes. Freshwater resource management is one area where such calls can be heard. Designing computer-based models for integrated environmental science poses special challenges to the research community. At present it is not clear whether such tools, or their outputs, receive much practical policy or planning application. It is argued that this is a result of (1) a lack of appreciation within the research modeling community of the characteristics of different decision-making processes including policy, planning, and (2) participation, (3) a lack of appreciation of the characteristics of different decision-making contexts, (4) the technical difficulties in implementing the necessary support tool functionality, and (5) the socio-technical demands of designing tools to be of practical use. This article presents a critical synthesis of ideas from each of these areas and interprets them in terms of design requirements for computer-based models being developed to provide scientific information support for policy and planning. Illustrative examples are given from the field of freshwater resources management. Although computer-based diagramming and modeling tools can facilitate processes of dialogue, they lack adequate simulation capabilities. Component-based models and modeling frameworks provide such functionality and may be suited to supporting problematic or messy decision contexts. However, significant technical (implementation) and socio-technical (use) challenges need to be addressed before such ambition can be realized.
Modeling the Effects of Cyber Operations on Kinetic Battles
2014-06-01
Nakashima, 2013). Equally dangerous are attacks targeting the national economy . In 2012, distributed denial of service (DDoS) attacks were carried out...enable our freedom of action in cyberspace. (USCYBERCOM Concept of Operations, v 1.0, 21 Sep 2010) Global Information Grid ( GIG ): The globally...managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing
ERIC Educational Resources Information Center
Further Education Unit, London (England).
A 1983 site-visit survey of 20 colleges actively engaged in developing their information technology (IT) expertise and resources indicate that many teachers do not appreciate the relevance of the computer to their work; few colleges have an effective and structured approach to IT in terms of staffing, equipment, or application; and lack of…
[Medical publications and information technologies].
Espinosa-Larrañaga, Francisco
2013-01-01
The development of the computer science during the last 30 years has had a very important influence in human life, changing paradigms on all daily activities like public policies, commerce, education and science development. The aim of this editorial is to communicate some considerations about the way the development of technology in information and communication had influenced on the spread of scientific knowledge in its using on medical publications.
Macauley, Molly; Palmer, Karen; Shih, Jhih-Shyang
2003-05-01
The importance of information technology to the world economy has brought about a surge in demand for electronic equipment. With rapid technological change, a growing fraction of the increasing stock of many types of electronics becomes obsolete each year. We model the costs and benefits of policies to manage 'e-waste' by focusing on a large component of the electronic waste stream-computer monitors-and the environmental concerns associated with disposal of the lead embodied in cathode ray tubes (CRTs) used in most monitors. We find that the benefits of avoiding health effects associated with CRT disposal appear far outweighed by the costs for a wide range of policies. For the stock of monitors disposed of in the United States in 1998, we find that policies restricting or banning some popular disposal options would increase disposal costs from about US dollar 1 per monitor to between US dollars 3 and US dollars 20 per monitor. Policies to promote a modest amount of recycling of monitor parts, including lead, can be less expensive. In all cases, however, the costs of the policies exceed the value of the avoided health effects of CRT disposal.
Connect Computer Education to Policies.
ERIC Educational Resources Information Center
Kimmelman, Paul
1985-01-01
The computer phenomenon has made rapid inroads into school curricula, often without proper board guidance or approval. Accordingly, this pamphlet discusses why and how computer education should be provided in schools and sets forth guidelines for school board policy regarding computers. An umbrella policy is proposed, defining "computer literacy"…
2013-03-01
within the Global information Grid ( GiG ) (AFDD6-0, 2011). JP 1-02 describes the GiG : 10 The GIG is the globally interconnected, end-to-end set of...to warfighters, policy makers, and support personnel. The GIG includes all owned and leased communications and computing systems and services...software (including applications), data, security services, and other 19 associated services necessary to achieve information superiority. The GIG
ERIC Educational Resources Information Center
Brown, Lori Jill
2012-01-01
For nurses or physicians practicing in any healthcare setting today, nothing seems to be as unsettling then change associated with the introduction of new information technology. The need for information technology has created a new host of challenges that do not easily align to clinical practice. In this study, perceptions of usefulness, ease of…
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
NASA Astrophysics Data System (ADS)
Rodriguez, Sarah L.; Lehman, Kathleen
2017-10-01
This theoretical paper explores the need for enhanced, intersectional computing identity theory for the purpose of developing a diverse group of computer scientists for the future. Greater theoretical understanding of the identity formation process specifically for computing is needed in order to understand how students come to understand themselves as computer scientists. To ensure that the next generation of computer scientists is diverse, this paper presents a case for examining identity development intersectionally, understanding the ways in which women and underrepresented students may have difficulty identifying as computer scientists and be systematically oppressed in their pursuit of computer science careers. Through a review of the available scholarship, this paper suggests that creating greater theoretical understanding of the computing identity development process will inform the way in which educational stakeholders consider computer science practices and policies.
Robust averaging protects decisions from noise in neural computations
Herce Castañón, Santiago; Solomon, Joshua A.; Vandormael, Hildward
2017-01-01
An ideal observer will give equivalent weight to sources of information that are equally reliable. However, when averaging visual information, human observers tend to downweight or discount features that are relatively outlying or deviant (‘robust averaging’). Why humans adopt an integration policy that discards important decision information remains unknown. Here, observers were asked to judge the average tilt in a circular array of high-contrast gratings, relative to an orientation boundary defined by a central reference grating. Observers showed robust averaging of orientation, but the extent to which they did so was a positive predictor of their overall performance. Using computational simulations, we show that although robust averaging is suboptimal for a perfect integrator, it paradoxically enhances performance in the presence of “late” noise, i.e. which corrupts decisions during integration. In other words, robust decision strategies increase the brain’s resilience to noise arising in neural computations during decision-making. PMID:28841644
Regulation, Privacy and Security: Chairman's Opening Remarks
Gabrieli, E.R.
1979-01-01
Medical privacy is a keystone of a free democratic society. To conserve the right of the patient to medical privacy, computerization of the medical data must be regulated. This paper enumerates some steps to be taken urgently for the protection of computerized sensitive medical data. A computer-oriented medical lexicon is urgently needed for accurate coding. Health industry standards should be drafted. The goals of various data centers must be sharply defined to avoid conflicts of interest. Medical privacy should be studied further, and medical data centers should consider cost-effectiveness. State boards for medical privacy should be created to monitor data security procedures. There is a need for purposeful decentralization. A national medical information policy should be drafted, and a national clinical information board should implement the nation's medical information policy.
INFLUENCE OF AGGREGATE SIZE ON SOLUTE TRANSPORT MEASURED USING COMPUTED TOMOGRAPHY. (R825549C023)
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...
A Model of Managerial Effectiveness in Information Security: From Grounded Theory to Empirical Test
2005-09-13
to observe employee performance (George, 1996) and encourage policy adherence ( Ariss , 2002) have been studied. While the published academic...for excessive monitoring ( Ariss , 2002). Managers have a key role to play in designing monitoring and enforcement systems that are effective yet not... Ariss , S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management. Information & Management, 39(7), 553-558. Armstrong, C. P
1996-07-04
of Information Warfare and Strategy graduated 32 students from its 10-month senior level (war college ) program on 12 June 1996. The event marked the...1989 prosecution of Robert Tappan Morris, a Cornell University graduate student who, on November 2, 1988, released a computer worm across the...2-25 2-2-1 Constitutional Amendments with Privacy Implications .................................... 2-28 2-2-2 Privacy and Access to Government
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
Workshop Report: The Future of ROK Navy-US Navy Cooperation
2007-10-01
vulnerability also increases. Cyber attacks to paralyze information and communication systems through hacking , virus attacks on computers, and jamming...Pacific Fleet (N5) 250 Makalpa Dr. Pearl Harbor, HI 96860-7000 Ms. Ariane L. Whitemore Chief of Staff, Strategic Planning and Policy HQ USPACOM/ J5 COS
Kernel Temporal Differences for Neural Decoding
Bae, Jihye; Sanchez Giraldo, Luis G.; Pohlmeyer, Eric A.; Francis, Joseph T.; Sanchez, Justin C.; Príncipe, José C.
2015-01-01
We study the feasibility and capability of the kernel temporal difference (KTD)(λ) algorithm for neural decoding. KTD(λ) is an online, kernel-based learning algorithm, which has been introduced to estimate value functions in reinforcement learning. This algorithm combines kernel-based representations with the temporal difference approach to learning. One of our key observations is that by using strictly positive definite kernels, algorithm's convergence can be guaranteed for policy evaluation. The algorithm's nonlinear functional approximation capabilities are shown in both simulations of policy evaluation and neural decoding problems (policy improvement). KTD can handle high-dimensional neural states containing spatial-temporal information at a reasonable computational complexity allowing real-time applications. When the algorithm seeks a proper mapping between a monkey's neural states and desired positions of a computer cursor or a robot arm, in both open-loop and closed-loop experiments, it can effectively learn the neural state to action mapping. Finally, a visualization of the coadaptation process between the decoder and the subject shows the algorithm's capabilities in reinforcement learning brain machine interfaces. PMID:25866504
A policy system for Grid Management and Monitoring
NASA Astrophysics Data System (ADS)
Stagni, Federico; Santinelli, Roberto; LHCb Collaboration
2011-12-01
Organizations using a Grid computing model are faced with non-traditional administrative challenges: the heterogeneous nature of the underlying resources requires professionals acting as Grid Administrators. Members of a Virtual Organization (VO) can use a subset of available resources and services in the grid infrastructure and in an ideal world, the more resoures are exploited the better. In the real world, the less faulty services, the better: experienced Grid administrators apply procedures for adding and removing services, based on their status, as it is reported by an ever-growing set of monitoring tools. When a procedure is agreed and well-exercised, a formal policy could be derived. For this reason, using the DIRAC framework in the LHCb collaboration, we developed a policy system that can enforce management and operational policies, in a VO-specific fashion. A single policy makes an assessment on the status of a subject, relative to one or more monitoring information. Subjects of the policies are monitored entities of an established Grid ontology. The status of a same entity is evaluated against a number of policies, whose results are then combined by a Policy Decision Point. Such results are enforced in a Policy Enforcing Point, which provides plug-ins for actions, like raising alarms, sending notifications, automatic addition and removal of services and resources from the Grid mask. Policy results are shown in the web portal, and site-specific views are provided also. This innovative system provides advantages in terms of procedures automation, information aggregation and problem solving.
Do Your School Policies Provide Equal Access to Computers? Are You Sure?
ERIC Educational Resources Information Center
DuBois, Phyllis A.; Schubert, Jane G.
1986-01-01
Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…
ERIC Educational Resources Information Center
Hill, Linda L.; Crosier, Scott J.; Smith, Terrence R.; Goodchild, Michael; Iannella, Renato; Erickson, John S.; Reich, Vicky; Rosenthal, David S. H.
2001-01-01
Includes five articles. Topics include requirements for a content standard to describe computational models; architectures for digital rights management systems; access control for digital information objects; LOCKSS (Lots of Copies Keep Stuff Safe) that allows libraries to run Web caches for specific journals; and a Web site from the U.S.…
Survey of Collaboration Technologies in Multi-level Security Environments
2014-04-28
infrastructure or resources. In this research program, the security implications of the US Air Force GeoBase (the US The problem is that in many cases...design structure. ORA uses a Java interface for ease of use, and a C++ computational backend . The current version ORA1.2 software is available on the...information: culture, policy, governance, economics and resources, and technology and infrastructure . This plan, the DoD Information Sharing
Operating rules for multireservoir systems
NASA Astrophysics Data System (ADS)
Oliveira, Rodrigo; Loucks, Daniel P.
1997-04-01
Multireservoir operating policies are usually defined by rules that specify either individual reservoir desired (target) storage volumes or desired (target) releases based on the time of year and the existing total storage volume in all reservoirs. This paper focuses on the use of genetic search algorithms to derive these multireservoir operating policies. The genetic algorithms use real-valued vectors containing information needed to define both system release and individual reservoir storage volume targets as functions of total storage in each of multiple within-year periods. Elitism, arithmetic crossover, mutation, and "en bloc" replacement are used in the algorithms to generate successive sets of possible operating policies. Each policy is then evaluated using simulation to compute a performance index for a given flow series. The better performing policies are then used as a basis for generating new sets of possible policies. The process of improved policy generation and evaluation is repeated until no further improvement in performance is obtained. The proposed algorithm is applied to example reservoir systems used for water supply and hydropower.
Information Assurance and Forensic Readiness
NASA Astrophysics Data System (ADS)
Pangalos, Georgios; Katos, Vasilios
Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
Multi-Media and Technology Tools: Curriculum and Activities for Idaho Business Teachers.
ERIC Educational Resources Information Center
Yopp, Marty; Kitchel, K. Allen; Allen, Tacey
This guide contains information, curriculum, and activities that provide business teachers with a tool for using the World Wide Web, multimedia, and technology to enhance their programs. The opening sections contain the following: computer use policy, multimedia fact sheet, tips on using Netscape Navigator, directory of educational resources on…
Incorporating Computer-Aided Language Sample Analysis into Clinical Practice
ERIC Educational Resources Information Center
Price, Lisa Hammett; Hendricks, Sean; Cook, Colleen
2010-01-01
Purpose: During the evaluation of language abilities, the needs of the child are best served when multiple types and sources of data are included in the evaluation process. Current educational policies and practice guidelines further dictate the use of authentic assessment data to inform diagnosis and treatment planning. Language sampling and…
Testing the Test: A Study of PARCC Field Trials in Two School Districts. Policy Brief
ERIC Educational Resources Information Center
Rennie Center for Education Research & Policy, 2015
2015-01-01
The potential use of computer-based assessments has raised concerns from educators, policymakers, and parents about information technology infrastructure in school districts and the preparation of staff and students to use new technologies for assessment purposes, and the potential impact of testing activities on core school functions,…
Computer Education in the Vocational Teacher Training Centre at Eindhoven.
ERIC Educational Resources Information Center
Houben, J. W. M. A.; Verbunt, J. A.
1985-01-01
Teachers from The Netherland's 26 higher technical colleges in need of a teaching qualification (called an "informatica") were able to obtain it by in-service training, organized and offered by universities. Types of courses offered and policy describing information technology activities to be developed in the country by 1989 are…
Information Communication Technology Policy and Public Primary Schools' Efficiency in Rwanda
ERIC Educational Resources Information Center
Munyengabe, Sylvestre; Haiyan, He; Yiyi, Zhao
2018-01-01
Teaching and learning processes have been developed through different methods and materials; nowadays the introduction of computers and other ICT tools in different forms and levels of education have been found to be highly influential in education system of different countries. The main objective of this study was to correlate Information…
Resources monitoring and automatic management system for multi-VO distributed computing system
NASA Astrophysics Data System (ADS)
Chen, J.; Pelevanyuk, I.; Sun, Y.; Zhemchugov, A.; Yan, T.; Zhao, X. H.; Zhang, X. M.
2017-10-01
Multi-VO supports based on DIRAC have been set up to provide workload and data management for several high energy experiments in IHEP. To monitor and manage the heterogeneous resources which belong to different Virtual Organizations in a uniform way, a resources monitoring and automatic management system based on Resource Status System(RSS) of DIRAC has been presented in this paper. The system is composed of three parts: information collection, status decision and automatic control, and information display. The information collection includes active and passive way of gathering status from different sources and stores them in databases. The status decision and automatic control is used to evaluate the resources status and take control actions on resources automatically through some pre-defined policies and actions. The monitoring information is displayed on a web portal. Both the real-time information and historical information can be obtained from the web portal. All the implementations are based on DIRAC framework. The information and control including sites, policies, web portal for different VOs can be well defined and distinguished within DIRAC user and group management infrastructure.
Policy Analysis: A Tool for Setting District Computer Use Policy. Paper and Report Series No. 97.
ERIC Educational Resources Information Center
Gray, Peter J.
This report explores the use of policy analysis as a tool for setting computer use policy in a school district by discussing the steps in the policy formation and implementation processes and outlining how policy analysis methods can contribute to the creation of effective policy. Factors related to the adoption and implementation of innovations…
NASA Automatic Information Security Handbook
NASA Technical Reports Server (NTRS)
1993-01-01
This handbook details the Automated Information Security (AIS) management process for NASA. Automated information system security is becoming an increasingly important issue for all NASA managers and with rapid advancements in computer and network technologies and the demanding nature of space exploration and space research have made NASA increasingly dependent on automated systems to store, process, and transmit vast amounts of mission support information, hence the need for AIS systems and management. This handbook provides the consistent policies, procedures, and guidance to assure that an aggressive and effective AIS programs is developed, implemented, and sustained at all NASA organizations and NASA support contractors.
Lessons learned from a privacy breach at an academic health science centre.
Malonda, Jacqueline; Campbell, Janice; Crivianu-Gaita, Daniela; Freedman, Melvin H; Stevens, Polly; Laxer, Ronald M
2009-01-01
In 2007, the Hospital for Sick Children experienced a serious privacy breach when a laptop computer containing the personal health information of approximately 3,000 patients and research subjects was stolen from a physician-researcher's vehicle. This incident was reported to the information and privacy commissioner of Ontario (IPC). The IPC issued an order that required the hospital to examine and revise its policies, practices and research protocols related to the protection of personal health information and to educate staff on privacy-related matters.
Developing an orientation program.
Edwards, K
1999-01-01
When the local area experienced tremendous growth and change, the radiology department at Maury Hospital in Columbia, Tennessee looked seriously at its orientation process in preparation for hiring additional personnel. It was an appropriate time for the department to review its orientation process and to develop a manual to serve as both a tool for supervisors and an ongoing reference for new employees. To gather information for the manual, supervisors were asked to identify information they considered vital for new employees to know concerning the daily operations of the department, its policies and procedures, the organizational structure of the hospital, and hospital and departmental computer systems. That information became the basis of the orientation manual, and provided an introduction to the hospital and radiology department; the structure of the organization; an overview of the radiology department; personnel information; operating procedures and computer systems; and various policies and procedures. With the manual complete, the radiology department concentrated on an orientation process that would meet the needs of supervisors who said they had trouble remembering the many details necessary to teach new employees. A pre-orientation checklist was developed, which contained the many details supervisors must handle between the time an employee is hired and arrives for work. The next step was the creation of a checklist for use by the supervisor during a new employee's first week on the job. A final step in the hospital's orientation program is to have each new employee evaluate the entire orientation process. That information is then used to update and revise the manual.
Andrewes, Holly; Kenicer, David; McClay, Carrie-Anne; Williams, Christopher
2013-01-01
Objective This study aimed to identify if patients have adequate access to Computerised Cognitive Behavioural Therapy (cCBT) programmes in all mental health trusts across England. Design The primary researcher contacted a targeted sample of information technology (IT) leads in each mental health trust in England to complete the survey. Setting Telephone, email and postal mail were used to contact an IT lead or nominated expert from each mental health trust. Participants 48 of the 56 IT experts from each mental health trust in England responded. The experts who were chosen had sufficient knowledge of the infrastructure, technology, policies and regulations to answer all survey questions. Results 77% of trusts provided computers for direct patient use, with computers in all except one trust meeting the specifications to access cCBT. However, 24% of trusts acknowledged that the number of computers provided was insufficient to provide a trust-wide service. 71% stated that the bandwidth available was adequate to provide access to cCBT sites, yet for many trusts, internet speed was identified as unpredictable and variable between locations. IT policies in only 56% of the trusts allowed National Health Service (NHS) staff to directly support patients as they complete cCBT courses via emails to the patients’ personal email account. Only 37% allowed support via internet video calls, and only 9% allowed support via instant messaging services. Conclusions Patient access to cCBT in English NHS mental health trusts is limited by the inadequate number of computers provided to patients, unpredictable bandwidth speed and inconsistent IT policies, which restrict patients from receiving the support needed to maximise the success of this therapy. English NHS mental health trusts need to alter IT policy and improve resources to reduce the waiting time for psychological resources required for patients seeking this evidence-based therapy. PMID:23377995
Computer Technology and Education: A Policy Delphi.
ERIC Educational Resources Information Center
Steier, Lloyd P.
Realizing the educational potential of computer technology largely depends on developing appropriate policies related to the technology. A Policy Delphi method was used to identify changes in education that are both probable and possible on account of the introduction of computers, and to explore potential patterns for arriving at a desired…
De Rosis, Sabina; Seghieri, Chiara
2015-08-22
There is general consensus that appropriate development and use of information and communication technologies (ICT) are crucial in the delivery of effective primary care (PC). Several countries are defining policies to support and promote a structural change of the health care system through the introduction of ICT. This study analyses the state of development of basic ICT in PC systems of 31 European countries with the aim to describe the extent of, and main purposes for, computer use by General Practitioners (GPs) across Europe. Additionally, trends over time have been analysed. Descriptive statistical analysis was performed on data from the QUALICOPC (Quality and Costs of Primary Care in Europe) survey, to describe the geographic differences in the general use of computer, and in specific computerized clinical functions for different health-related purposes such as prescribing, medication checking, generating health records and research for medical information on the Internet. While all the countries have achieved a near-universal adoption of a computer in their primary care practices, with only a few countries near or under the boundary of 90 %, the computerisation of primary care clinical functions presents a wide variability of adoption within and among countries and, in several cases (such as in the southern and central-eastern Europe), a large room for improvement. At European level, more efforts could be done to support southern and central-eastern Europe in closing the gap in adoption and use of ICT in PC. In particular, more attention seems to be need on the current usages of the computer in PC, by focusing policies and actions on the improvement of the appropriate usages that can impact on quality and costs of PC and can facilitate an interconnected health care system. However, policies and investments seem necessary but not sufficient to achieve these goals. Organizational, behavioural and also networking aspects should be taken in consideration.
Dividing at an Early Age: The Hidden Digital Divide in Ohio Elementary Schools
ERIC Educational Resources Information Center
Wood, Lawrence; Howley, Aimee
2012-01-01
Computers are now a ubiquitous part of US elementary school education. With policy reports suggesting that inequities in information and communication technology (ICT) access across US schools are a thing of the past, investigating how such resources and their use may nonetheless continue to vary becomes all that much more important. Through a…
Copyright Law and Information Policy Planning: Public Rights of Use in the 1990s and Beyond.
ERIC Educational Resources Information Center
Crews, Kenneth D.
1995-01-01
Summarizes recent developments in copyright law, with a focus on their consequences for users in colleges, universities, and libraries. Highlights include the concept of fair use; library reproduction rights; recent court cases and legislation; and future copyright concerns, including fair use of computer software and electronic text, and license…
ERIC Educational Resources Information Center
du Plessis, Andre; Webb, Paul
2012-01-01
This case study, involving 30 participating teachers from six previously disadvantaged South African schools, provides data on teacher perceptions of the challenges related to implementing Information and Communication Technology (ICT). The schools had minimal resources as a residual result of the South African apartheid policy prior to 1994 and…
The use of computational ecological models to inform environmental management and policy has proliferated in the past 25 years. These models have become essential tools as linkages and feedbacks between human actions and ecological responses can be complex, and as funds for sampl...
Rural School Finance: A Critical Analysis of Current Practice in Illinois.
ERIC Educational Resources Information Center
Lows, Raymond L.
School finance is basic to understanding and improving the condition of rural education. Information necessary for financial planning and policy development at the state and local levels is stored in large computer readable data bases and needs to be accessed. Pertinent data elements need to be extracted from the data base and relationships among…
7 CFR 989.154 - Marketing policy computations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 8 2010-01-01 2010-01-01 false Marketing policy computations. 989.154 Section 989.154 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... GROWN IN CALIFORNIA Administrative Rules and Regulations Marketing Policy § 989.154 Marketing policy...
7 CFR 989.154 - Marketing policy computations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 8 2014-01-01 2014-01-01 false Marketing policy computations. 989.154 Section 989.154 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... GROWN IN CALIFORNIA Administrative Rules and Regulations Marketing Policy § 989.154 Marketing policy...
7 CFR 989.154 - Marketing policy computations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 8 2011-01-01 2011-01-01 false Marketing policy computations. 989.154 Section 989.154 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... GROWN IN CALIFORNIA Administrative Rules and Regulations Marketing Policy § 989.154 Marketing policy...
7 CFR 989.154 - Marketing policy computations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 8 2013-01-01 2013-01-01 false Marketing policy computations. 989.154 Section 989.154 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... GROWN IN CALIFORNIA Administrative Rules and Regulations Marketing Policy § 989.154 Marketing policy...
Federated Tensor Factorization for Computational Phenotyping
Kim, Yejin; Sun, Jimeng; Yu, Hwanjo; Jiang, Xiaoqian
2017-01-01
Tensor factorization models offer an effective approach to convert massive electronic health records into meaningful clinical concepts (phenotypes) for data analysis. These models need a large amount of diverse samples to avoid population bias. An open challenge is how to derive phenotypes jointly across multiple hospitals, in which direct patient-level data sharing is not possible (e.g., due to institutional policies). In this paper, we developed a novel solution to enable federated tensor factorization for computational phenotyping without sharing patient-level data. We developed secure data harmonization and federated computation procedures based on alternating direction method of multipliers (ADMM). Using this method, the multiple hospitals iteratively update tensors and transfer secure summarized information to a central server, and the server aggregates the information to generate phenotypes. We demonstrated with real medical datasets that our method resembles the centralized training model (based on combined datasets) in terms of accuracy and phenotypes discovery while respecting privacy. PMID:29071165
Management: A bibliography for NASA managers (supplement 21)
NASA Technical Reports Server (NTRS)
1987-01-01
This bibliography lists 664 reports, articles and other documents introduced into the NASA scientific and technical information system in 1986. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy.
Management: A bibliography for NASA Managers
NASA Technical Reports Server (NTRS)
1986-01-01
This bibliography lists 707 reports, articles and other documents introduced into the NASA scientific and technology information system in 1985. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1991-01-01
This bibliography lists 731 reports, articles and other documents introduced into the NASA Scientific and Technical Information System in 1990. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1990-01-01
This bibliography lists 755 reports, articles and other documents introduced into the NASA Scientific and Technical Information System in 1989. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1989-01-01
This bibliography lists 822 reports, articles and other documents introduced into the NASA Scientific and Technical Information System in 1988. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1985-01-01
This bibliography lists 706 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1984. Entries, which include abstracts, are arranged in the following categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy. Subject, personal author, corporate source, contract number, report number, and accession number indexes are included.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1992-01-01
This bibliography lists 630 reports, articles and other documents introduced into the NASA Scientific and Technical Information System in 1991. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy.
Management: A bibliography for NASA managers
NASA Technical Reports Server (NTRS)
1988-01-01
This bibliography lists 653 reports, articles and other documents introduced into the NASA scientific and technical information system in 1987. Items are selected and grouped according to their usefulness to the manager as manager. Citiations are grouped into ten subject categories; human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs and markets; logistics and operations management, reliability and quality control; and legality, legislation, and policy.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...
Ethics and the 7 `P`s` of computer use policies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scott, T.J.; Voss, R.B.
1994-12-31
A Computer Use Policy (CUP) defines who can use the computer facilities for what. The CUP is the institution`s official position on the ethical use of computer facilities. The authors believe that writing a CUP provides an ideal platform to develop a group ethic for computer users. In prior research, the authors have developed a seven phase model for writing CUPs, entitled the 7 P`s of Computer Use Policies. The purpose of this paper is to present the model and discuss how the 7 P`s can be used to identify and communicate a group ethic for the institution`s computer users.
Decentralized Grid Scheduling with Evolutionary Fuzzy Systems
NASA Astrophysics Data System (ADS)
Fölling, Alexander; Grimme, Christian; Lepping, Joachim; Papaspyrou, Alexander
In this paper, we address the problem of finding workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end, we establish a non-invasive collaboration model on the Grid layer which requires minimal information about the participating High Performance and High Throughput Computing (HPC/HTC) centers and which leaves the local resource managers completely untouched. In this environment of fully autonomous sites, independent users are assumed to submit their jobs to the Grid middleware layer of their local site, which in turn decides on the delegation and execution either on the local system or on remote sites in a situation-dependent, adaptive way. We find for different scenarios that the exchange policies show good performance characteristics not only with respect to traditional metrics such as average weighted response time and utilization, but also in terms of robustness and stability in changing environments.
NASA Technical Reports Server (NTRS)
Santiago, S. Scott; Moyles, Thomas J. (Technical Monitor)
2001-01-01
This viewgraph presentation provides information on the importance of information technology (IT) security (ITS) to NASA's mission. Several points are made concerning the subject. In order for ITS to be successful, it must be supported by management. NASA, while required by law to keep the public informed of its pursuits, must take precautions due to possible IT-based incursions by computer hackers and other malignant persons. Fear is an excellent motivation for establishing and maintaining a robust ITS policy. The ways in which NASA ITS personnel continually increase security are manifold, however a great deal relies upon the active involvement of the entire NASA community.
User Accounts | High-Performance Computing | NREL
see information on user account policies. ACCOUNT PASSWORDS Logging in for the first time? Forgot your Accounts User Accounts Learn how to request an NREL HPC user account. Request an HPC Account To request an HPC account, please complete our request form. This form is provided using DocuSign. REQUEST
USDA-ARS?s Scientific Manuscript database
Agricultural phosphorus (P) management is a pressing research and policy issue due to concerns about P loss from fields and water quality degradation. Better information is especially needed on the risk of P loss from dairy manure applied to fields in winter. We used the SurPhos computer model to as...
The use of computational ecological models to inform environmental management and policy has proliferated in the past 25 years. These models have become essential tools as linkages and feedbacks between human actions and ecological responses can be complex, and as funds for sampl...
ERIC Educational Resources Information Center
Robadue, Donald D., Jr.
2012-01-01
Those advocating for effective management of the use of coastal areas and ecosystems have long aspired for an approach to governance that includes information systems with the capability to predict the end results of various courses of action, monitor the impacts of decisions and compare results with those predicted by computer models in order to…
2015-01-01
field effective command and control sys- tems within the framework of current policies and processes. Cost Considerations in Cloud Computing ...www.rand.org/t/PE113 Finds that cloud provider costs can vary compared with tradi- tional information system alternatives because of different cost structures...for analysts evaluating new cloud investments. U.S. Army photo by Staff Sgt. Christopher Calvert FOCUS ON Capabilities Development and Acquisition
Redefining Security. A Report by the Joint Security Commission
1994-02-28
security policies. This report offers recommendations on developing new strategies for achieving security within our infor-mation systems, including...better, and we outline methods of improving government and industry personnel security poli- cies. We offer recommendations on developing new strategies ... strategies , sufficient funding, and management attention if our comput- ers and networks are to protect the confidentiality, integrity, and availability of
ERIC Educational Resources Information Center
Linn, Marcia
This paper analyzes the capabilities of the computer learning environment identified by the Assessing the Cognitive Consequences of Computer Environments for Learning (ACCCEL) Project, augments the analysis with experimental work, and discusses how schools can implement policies which provide for the maximum potential of computers. The ACCCEL…
Quality evaluation of portal sites in health system, as a tool for education and learning.
Hejazi, Sayed Mehdi; Sarmadi, Sima
2013-01-01
The main objective of creating a portal is to make information service available for users who need them for performance of duties and responsibilities regardless of the sources. This article is attempted to consider the parameters that can evaluate these sites since these criteria can be effective in designing and implementing such portals. On the other hand, portal sites in health systems of every country make it possible for leaders, policy makers, and directors to system education as a tool for new learning technologies. One of the main decisions each manager has to make is precise selection of appropriate portal sites. This is a descriptive and qualitative study. The research sample was 53 computer professional working in the area of computer programming and design. In the first part of the study a questionnaire was send to the participants and in the second part of the study based on their response to the questionnaire the participant was interviewed and the main themes of the studies were formulated. The validity and the reliability of the questionnaire were confirmed. The study results were summarized in 10 themes and 50 sub-categories. The main themes included were portal requirements, security, management, and efficiency, user friendliness, built-in applications, portal flexibility, interoperability, and support systems. Portal sites in any education systems make it possible for health system leaders and policy makers to manage their organization information system efficiently and effectively. One of the major decisions each manager has to make is precise selection of an appropriate portal sites design and development. The themes and sub-categories of this study could help health system managers and policy makers and information technology professionals to make appropriate decisions regarding portal design and development.
Shared Storage Usage Policy | High-Performance Computing | NREL
Shared Storage Usage Policy Shared Storage Usage Policy To use NREL's high-performance computing (HPC) systems, you must abide by the Shared Storage Usage Policy. /projects NREL HPC allocations include storage space in the /projects filesystem. However, /projects is a shared resource and project
1984-07-01
An overview of current population information programs at the regional, national, and global level was presented at a meeting of the Expert Working Group on Development of Population Information Centres and Networks. On the global level, the decentralized Population Information Network (POPIN) was established, consisting of population libraries, clearinghouses, information systems, and documentation centers. The Economic and Social Commission for Asia and the Pacific (ESCAP) Regional Population Information Centre (PIC) has actively promoted the standardization of methodologies for the collection and processing of data, the use of compatible terminology, adoption of classification systems, computer-assisted data and information handling, and improved programs of publication and infomration dissemination, within and among national centers. Among the national PICs, 83% are attached to the primary national family planning/fertility control unit and 17% are attached to demographic data, research, and analysis units. Lack of access to specialized information handling equipment such as microcomputers, word processors, and computer terminals remains a problem for PICs. Recommendations were made by the Expert Working Group to improve the functions of PICs: 1) the mandate and resoponsibilities of the PIC should be explicilty stated; 2) PICs should collect, process, and disseminate population information in the most effective format to workers in the population feild; 3) PICs should be given flexibility in the performance of activitites by their governing bodies; 4) short-term training should be provided in computerization and dissemination of information; 5) research and evaluation mechanisms for PIC activities should be developed; 6) PIC staff should prepare policy briefs for decision makers; 7) access to parent organizations should be given to nongovernment PICs; 8) study tours to foreign PICs should be organized for PIC staff; and 9) on-the-job training in indexing and abstracting should be provided. Networking among PICs can be further facilitated by written acquisition policies, automation of bibliographic information, common classification systems, and exchange of ideas and experience between various systems.
Robust optimal control of material flows in demand-driven supply networks
NASA Astrophysics Data System (ADS)
Laumanns, Marco; Lefeber, Erjen
2006-04-01
We develop a model based on stochastic discrete-time controlled dynamical systems in order to derive optimal policies for controlling the material flow in supply networks. Each node in the network is described as a transducer such that the dynamics of the material and information flows within the entire network can be expressed by a system of first-order difference equations, where some inputs to the system act as external disturbances. We apply methods from constrained robust optimal control to compute the explicit control law as a function of the current state. For the numerical examples considered, these control laws correspond to certain classes of optimal ordering policies from inventory management while avoiding, however, any a priori assumptions about the general form of the policy.
Computer Viruses. Legal and Policy Issues Facing Colleges and Universities.
ERIC Educational Resources Information Center
Johnson, David R.; And Others
Compiled by various members of the higher educational community together with risk managers, computer center managers, and computer industry experts, this report recommends establishing policies on an institutional level to protect colleges and universities from computer viruses and the accompanying liability. Various aspects of the topic are…
White Paper for US Space Policy Going Forward
NASA Astrophysics Data System (ADS)
Sinclair, A.
2009-04-01
White Paper for US Space Policy Going Forward In January 2009 we see both the US government and US civil society focus into the resolution of many serious problems, as we look towards a new administration for direction and initiative. Among leading factors in determining the outcomes for the years ahead will be the significant role-played by US space policy for the way forward. A policy making that will determine and address many of the attributes of the forthcoming" information age" The popular term which indicates space based communications and observation structures as providing a growing capacity for an informational and computational enabled problem solving bias. The linkage between space development and a growing information development is an issue that can reach for all levels of US civil society, offering significant educational perspectives and engaging for an immediate placement within our laptops and our on-line methodologies. Such capacity has been generally brought forward and engendered within the US by a Silicon Valley community that has initiated for both the burgeoning growth of space based communications and for the advent of the nearer affects within our everyday lives. Likewise the production of large scale computational and AI abilities shows as an outstanding and remarkable opportunity within the US technological capacities Such initiatives have been greatly advanced by US for more than thirty years, yet today despite the outreach, export and rapid expansion of US high tech industry, the US seeks new direction for clarification and provision into the further stages of US technological growth. What is that direction and how will it be obtained? Today the venue and purpose of the modern space based and information enabled assets gives a clear functionality for many global scale interchanges and dialogs. The leading factors that will enable significant US outreach into these essential global perspectives can obtain at various levels within international space policy forums. For example: International agendas for space exploration, including international lunar settlement,the preparation of an international space shuttle and an international program for meteorite mitigation. Growing capacity of earth observation facilities Development of the informational basis within the global development arenas Information enabled inter-governmental exchange and problem solving perspectives for economic, agricultural and infrastructure development. The civil society basis within e-government International Cyberspace For US engagement into the international community at the best possible levels it is essential that US Space policy consider for the global scale affects that can be undertaken within the growing information technology attributes. These initiating attributes will also be the ones that determine for fast referendums into sustainable practice, for the revisions of an industrial base, for needed infrastructures in many areas and for comprehensive levels of educational engagement into the way forward. Both within the US, and as US outreach within global dynamics. US stands to gain through the momentum into the space and information basis, but such gain will be seen as a direct result of an integrated policy making, that identifies the authentic purpose and intention of space development for a future world. The comprehensive alignment of US space policy into the national, international and global development agendas is a topic that can only be undertaken within a measure of US public engagement. Engagement which can be found within US policy making initiative, in particular through worthwhile interchange and participation with Space Agencies around the world for development of an internationalized approach. Such an internationalized approach can be for the moon and for the earth, for education,for non -proliferation, for global security, for civil society representation and for the stringent terms of a climate change. Ways and means are many and readily available ones, what is needed are not necessarily newer levels of technological innovation but the purpose and intention to guide those that already exist. In particular the administration refocus for US Space Policy will require not only a careful and well-intentioned educational and developmental bias, but also an acknowledgment of the continuing purpose of US space and technology attributes into the essential US economic dimensions. In this way obtaining a continuing and advanced technological purview for US policy and for US technological exports, as contribution for rapid global development and for the undertakings of a pacifist and secure condition.
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
Dynamic remapping of parallel computations with varying resource demands
NASA Technical Reports Server (NTRS)
Nicol, D. M.; Saltz, J. H.
1986-01-01
A large class of computational problems is characterized by frequent synchronization, and computational requirements which change as a function of time. When such a problem must be solved on a message passing multiprocessor machine, the combination of these characteristics lead to system performance which decreases in time. Performance can be improved with periodic redistribution of computational load; however, redistribution can exact a sometimes large delay cost. We study the issue of deciding when to invoke a global load remapping mechanism. Such a decision policy must effectively weigh the costs of remapping against the performance benefits. We treat this problem by constructing two analytic models which exhibit stochastically decreasing performance. One model is quite tractable; we are able to describe the optimal remapping algorithm, and the optimal decision policy governing when to invoke that algorithm. However, computational complexity prohibits the use of the optimal remapping decision policy. We then study the performance of a general remapping policy on both analytic models. This policy attempts to minimize a statistic W(n) which measures the system degradation (including the cost of remapping) per computation step over a period of n steps. We show that as a function of time, the expected value of W(n) has at most one minimum, and that when this minimum exists it defines the optimal fixed-interval remapping policy. Our decision policy appeals to this result by remapping when it estimates that W(n) is minimized. Our performance data suggests that this policy effectively finds the natural frequency of remapping. We also use the analytic models to express the relationship between performance and remapping cost, number of processors, and the computation's stochastic activity.
Energy-economic policy modeling
NASA Astrophysics Data System (ADS)
Sanstad, Alan H.
2018-01-01
Computational models based on economic principles and methods are powerful tools for understanding and analyzing problems in energy and the environment and for designing policies to address them. Among their other features, some current models of this type incorporate information on sustainable energy technologies and can be used to examine their potential role in addressing the problem of global climate change. The underlying principles and the characteristics of the models are summarized, and examples of this class of model and their applications are presented. Modeling epistemology and related issues are discussed, as well as critiques of the models. The paper concludes with remarks on the evolution of the models and possibilities for their continued development.
Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima
2015-01-01
Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers' ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop.
Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima
2015-01-01
Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers’ ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop. PMID:26448807
2011-05-01
communications and on computer networks—its Global Information Grid—which are potentially jeopardized by the millions of denial-of-service attacks, hacking ...Director,a National Security Agency Chief of Staff Joint Operations Center Defense Information Systems Agency Command Center J1 J2 J3 J4 J5 J6 J7 J8...DC Joint Staff • J39, Operations, Pentagon, Washington, DC • J5 , Strategic Plans and Policy, Pentagon, Washington, DC U.S. Strategic Command • J882
Life-histories from Landsat: Algorithmic approaches to distilling Earth's recent ecological dynamics
NASA Astrophysics Data System (ADS)
Kennedy, R. E.; Yang, Z.; Braaten, J.; Cohen, W. B.; Ohmann, J.; Gregory, M.; Roberts, H.; Meigs, G. W.; Nelson, P.; Pfaff, E.
2012-12-01
As the longest running continuous satellite Earth-observation record, data from the Landsat family of sensors have the potential to uniquely reveal temporal dynamics critical to many terrestrial disciplines. The convergence of a free-data access policy in the late 2000s with a rapid rise in computing and storage capacity has highlighted an increasinagly common challenge: effective distillation of information from large digital datasets. Here, we describe how an algorithmic workflow informed by basic understanding of ecological processes is being used to convert multi-terabyte image time-series datasets into concise renditions of landscape dynamics. Using examples from our own work, we show how these are in turn applied to monitor vegetative disturbance and growth dynamics in national parks, to evaluate effectiveness of natural resource policy in national forests, to constrain and inform biogeochemical models, to measure carbon impacts of natural and anthropogenic stressors, to assess impacts of land use change on threatened species, to educate and inform students, and to better characterize complex links between changing climate, insect pathogens, and wildfire in forests.
Technology in the Montessori Classroom: Benefits, Hazards and Preparation for Life
ERIC Educational Resources Information Center
MacDonald, Greg
2016-01-01
Greg MacDonald cites much research on the pros and cons of technology for children of all ages and gives the reader the information and space to sort out what their own policy will be. He supports the use of computers in elementary classrooms if there is a practical purpose, a group project, or no alternative approach available, such as for…
An Organization Design for the PERSPAY Consolidated Data Center.
1983-06-01
GENERAL 25 B. PROGRAM DEVELOPMENT 30 C. COMPUTER OPERATIONS 33 D. TECHNICAL SUPPORT BRANCH 36 E. MANAGEMENT OF THE D.P. ORGANIZATION...support, and 4) management , including planning, administration, and control ( Brandon , Norton Gaydasch, Frank). The following list shows the... Management policy on just what the ADP installation is expected to do is an information requirement that must be satisfied in order for the operation to
JPRS Report, Science & Technology, USSR: Science & Technology Policy
1988-09-23
number of library personnel for preparing survey -analyt- ical references, but by equipping them with modern computer hardware for acquiring information...of manpower, material, technical, and financial resources and limits of capital investments and planning, surveying , and contractual work, which...USSR State Prize for the development and introduction of a technology of the production of shampoo from fish protein. During the period under review
Coughlin, J; D'Ambrosio, L A; Reimer, B; Pratt, M R
2007-01-01
Advances in information communications technology and related computational power are providing a wide array of systems and related services that form the basis of smart home technologies to support the health, safety and independence of older adults. While these technologies offer significant benefits to older people and their families, they are also transforming older adults into lead adopters of a new 24/7 lifestyle of being monitored, managed, and, at times, motivated, to maintain their health and wellness. To better understand older adult perceptions of smart home technologies and to inform future research a workshop and focus group was conducted with 30 leaders in aging advocacy and aging services from 10 northeastern states. Participants expressed support of technological advance along with a variety of concerns that included usability, reliability, trust, privacy, stigma, accessibility and affordability. Participants also observed that there is a virtual absence of a comprehensive market and policy environment to support either the consumer or the diffusion of these technologies. Implications for research, policy and market innovation are discussed.
Study of education disparities and health information seeking behavior.
Lorence, Daniel; Park, Heeyoung
2007-02-01
This exploratory technology assessment examines how educational characteristics of health information seekers are associated with access to computers, the Internet, and online health information. Specifically, we examine (1) if there exists significant variation across identified health technology user groups regarding access to online health information, and (2) if differences between education levels have narrowed, remained constant, or widened over recent years, following national educational initiatives to narrow the technology gap for low-education user groups. Using a stratified sample from national tracking survey data, we find that recent policy initiatives under national technology access and other programs have demonstrated little effect in narrowing the digital divide for low-education users of web-based technologies.
Privacy Management and Networked PPD Systems - Challenges Solutions.
Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise
2015-01-01
Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.
Global information infrastructure.
Lindberg, D A
1994-01-01
The High Performance Computing and Communications Program (HPCC) is a multiagency federal initiative under the leadership of the White House Office of Science and Technology Policy, established by the High Performance Computing Act of 1991. It has been assigned a critical role in supporting the international collaboration essential to science and to health care. Goals of the HPCC are to extend USA leadership in high performance computing and networking technologies; to improve technology transfer for economic competitiveness, education, and national security; and to provide a key part of the foundation for the National Information Infrastructure. The first component of the National Institutes of Health to participate in the HPCC, the National Library of Medicine (NLM), recently issued a solicitation for proposals to address a range of issues, from privacy to 'testbed' networks, 'virtual reality,' and more. These efforts will build upon the NLM's extensive outreach program and other initiatives, including the Unified Medical Language System (UMLS), MEDLARS, and Grateful Med. New Internet search tools are emerging, such as Gopher and 'Knowbots'. Medicine will succeed in developing future intelligent agents to assist in utilizing computer networks. Our ability to serve patients is so often restricted by lack of information and knowledge at the time and place of medical decision-making. The new technologies, properly employed, will also greatly enhance our ability to serve the patient.
Heuristic and optimal policy computations in the human brain during sequential decision-making.
Korn, Christoph W; Bach, Dominik R
2018-01-23
Optimal decisions across extended time horizons require value calculations over multiple probabilistic future states. Humans may circumvent such complex computations by resorting to easy-to-compute heuristics that approximate optimal solutions. To probe the potential interplay between heuristic and optimal computations, we develop a novel sequential decision-making task, framed as virtual foraging in which participants have to avoid virtual starvation. Rewards depend only on final outcomes over five-trial blocks, necessitating planning over five sequential decisions and probabilistic outcomes. Here, we report model comparisons demonstrating that participants primarily rely on the best available heuristic but also use the normatively optimal policy. FMRI signals in medial prefrontal cortex (MPFC) relate to heuristic and optimal policies and associated choice uncertainties. Crucially, reaction times and dorsal MPFC activity scale with discrepancies between heuristic and optimal policies. Thus, sequential decision-making in humans may emerge from integration between heuristic and optimal policies, implemented by controllers in MPFC.
Patient Core Data Set. Standard for a longitudinal health/medical record.
Renner, A L; Swart, J C
1997-01-01
Blue Chip Computers Company, in collaboration with Wright State University-Miami Valley College of Nursing and Health, with support from the Agency for Health Care Policy and Research, Public Health Service, completed Small Business innovative Research research to design a comprehensive integrated Patient information System. The Wright State University consultants undertook the development of a Patient Core Data Set (PCDS) in response to the lack of uniform standards of minimum data sets, and lack of standards in data transfer for continuity of care. The purpose of the Patient Core Data Set is to develop a longitudinal patient health record and medical history using a common set of standard data elements with uniform definitions and coding consistent with Health Level 7 (HL7) protocol and the American Society for Testing and Materials (ASTM) standards. The PCDS, intended for transfer across all patient-care settings, is essential information for clinicians, administrators, researchers, and health policy makers.
Methods, systems, and computer program products for network firewall policy optimization
Fulp, Errin W [Winston-Salem, NC; Tarsa, Stephen J [Duxbury, MA
2011-10-18
Methods, systems, and computer program products for firewall policy optimization are disclosed. According to one method, a firewall policy including an ordered list of firewall rules is defined. For each rule, a probability indicating a likelihood of receiving a packet matching the rule is determined. The rules are sorted in order of non-increasing probability in a manner that preserves the firewall policy.
NASA Astrophysics Data System (ADS)
Aneri, Parikh; Sumathy, S.
2017-11-01
Cloud computing provides services over the internet and provides application resources and data to the users based on their demand. Base of the Cloud Computing is consumer provider model. Cloud provider provides resources which consumer can access using cloud computing model in order to build their application based on their demand. Cloud data center is a bulk of resources on shared pool architecture for cloud user to access. Virtualization is the heart of the Cloud computing model, it provides virtual machine as per application specific configuration and those applications are free to choose their own configuration. On one hand, there is huge number of resources and on other hand it has to serve huge number of requests effectively. Therefore, resource allocation policy and scheduling policy play very important role in allocation and managing resources in this cloud computing model. This paper proposes the load balancing policy using Hungarian algorithm. Hungarian Algorithm provides dynamic load balancing policy with a monitor component. Monitor component helps to increase cloud resource utilization by managing the Hungarian algorithm by monitoring its state and altering its state based on artificial intelligent. CloudSim used in this proposal is an extensible toolkit and it simulates cloud computing environment.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2010 CFR
2010-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2012 CFR
2012-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2014 CFR
2014-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
Code of Federal Regulations, 2013 CFR
2013-10-01
.... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Computing and Communications (C) Division is responsible for the Laboratory's Integrated Computing Network (ICN) as well as Laboratory-wide communications. Our computing network, used by 8,000 people distributed throughout the nation, constitutes one of the most powerful scientific computing facilities in the world. In addition to the stable production environment of the ICN, we have taken a leadership role in high-performance computing and have established the Advanced Computing Laboratory (ACL), the site of research on experimental, massively parallel computers; high-speed communication networks; distributed computing; and a broad variety of advanced applications. The computational resources available in the ACL are ofmore » the type needed to solve problems critical to national needs, the so-called Grand Challenge'' problems. The purpose of this publication is to inform our clients of our strategic and operating plans in these important areas. We review major accomplishments since late 1990 and describe our strategic planning goals and specific projects that will guide our operations over the next few years. Our mission statement, planning considerations, and management policies and practices are also included.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Computing and Communications (C) Division is responsible for the Laboratory`s Integrated Computing Network (ICN) as well as Laboratory-wide communications. Our computing network, used by 8,000 people distributed throughout the nation, constitutes one of the most powerful scientific computing facilities in the world. In addition to the stable production environment of the ICN, we have taken a leadership role in high-performance computing and have established the Advanced Computing Laboratory (ACL), the site of research on experimental, massively parallel computers; high-speed communication networks; distributed computing; and a broad variety of advanced applications. The computational resources available in the ACL are ofmore » the type needed to solve problems critical to national needs, the so-called ``Grand Challenge`` problems. The purpose of this publication is to inform our clients of our strategic and operating plans in these important areas. We review major accomplishments since late 1990 and describe our strategic planning goals and specific projects that will guide our operations over the next few years. Our mission statement, planning considerations, and management policies and practices are also included.« less
Privacy-Related Context Information for Ubiquitous Health
Nykänen, Pirkko; Ruotsalainen, Pekka
2014-01-01
Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components are regulated or in what kind of environment data can be processed. Conclusions This study added to the vision of ubiquitous health by analyzing information processing from the viewpoint of an individual’s privacy. We learned that health and wellness-related activities may happen in several environments and situations with multiple stakeholders, services, and systems. We have provided new knowledge regarding privacy-related context information and corresponding components by analyzing typical activities in ubiquitous health. With the identified components and their properties, individuals can define their personal preferences on information processing based on situational information, and privacy services can capture privacy-related context of the information-processing situation. PMID:25100084
Privacy-related context information for ubiquitous health.
Seppälä, Antto; Nykänen, Pirkko; Ruotsalainen, Pekka
2014-03-11
Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components are regulated or in what kind of environment data can be processed. This study added to the vision of ubiquitous health by analyzing information processing from the viewpoint of an individual's privacy. We learned that health and wellness-related activities may happen in several environments and situations with multiple stakeholders, services, and systems. We have provided new knowledge regarding privacy-related context information and corresponding components by analyzing typical activities in ubiquitous health. With the identified components and their properties, individuals can define their personal preferences on information processing based on situational information, and privacy services can capture privacy-related context of the information-processing situation.
Computational Models Used to Assess US Tobacco Control Policies.
Feirman, Shari P; Glasser, Allison M; Rose, Shyanika; Niaura, Ray; Abrams, David B; Teplitskaya, Lyubov; Villanti, Andrea C
2017-11-01
Simulation models can be used to evaluate existing and potential tobacco control interventions, including policies. The purpose of this systematic review was to synthesize evidence from computational models used to project population-level effects of tobacco control interventions. We provide recommendations to strengthen simulation models that evaluate tobacco control interventions. Studies were eligible for review if they employed a computational model to predict the expected effects of a non-clinical US-based tobacco control intervention. We searched five electronic databases on July 1, 2013 with no date restrictions and synthesized studies qualitatively. Six primary non-clinical intervention types were examined across the 40 studies: taxation, youth prevention, smoke-free policies, mass media campaigns, marketing/advertising restrictions, and product regulation. Simulation models demonstrated the independent and combined effects of these interventions on decreasing projected future smoking prevalence. Taxation effects were the most robust, as studies examining other interventions exhibited substantial heterogeneity with regard to the outcomes and specific policies examined across models. Models should project the impact of interventions on overall tobacco use, including nicotine delivery product use, to estimate preventable health and cost-saving outcomes. Model validation, transparency, more sophisticated models, and modeling policy interactions are also needed to inform policymakers to make decisions that will minimize harm and maximize health. In this systematic review, evidence from multiple studies demonstrated the independent effect of taxation on decreasing future smoking prevalence, and models for other tobacco control interventions showed that these strategies are expected to decrease smoking, benefit population health, and are reasonable to implement from a cost perspective. Our recommendations aim to help policymakers and researchers minimize harm and maximize overall population-level health benefits by considering the real-world context in which tobacco control interventions are implemented. © The Author 2017. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Barriers to use of information and computer technology by Australia's nurses: a national survey.
Eley, Robert; Fallon, Tony; Soar, Jeffrey; Buikstra, Elizabeth; Hegney, Desley
2009-04-01
To support policy planning for health, the barriers to the use of health information and computer technology (ICT) by nurses in Australia were determined. Australia, in line with many countries, aims to achieve a better quality of care and health outcomes through effective and innovative use of health information. Nurses form the largest component of the health workforce. Successful adoption of ICT by nurses will be a requirement for success. No national study has been undertaken to determine the barriers to adoption. A self-administered postal survey was conducted. A questionnaire was distributed to 10,000 members of the Australian Nursing Federation. Twenty possible barriers to the use of health ICT uptake were offered and responses were given on a five point Likert scale. Work demands, access to computers and lack of support were the principal barriers faced by nurses to their adoption of the technology in the workplace. Factors that were considered to present few barriers included age and lack of interest. While age was not considered by the respondents to be a barrier, their age was positively correlated with several barriers, including knowledge and confidence in the use of computers. Results indicate that to use the information and computer technologies being brought into health care fully, barriers that prevent the principal users from embracing those technologies must be addressed. Factors such as the age of the nurse and their level of job must be considered when developing strategies to overcome barriers. The findings of the present study provide essential information not only for national government and state health departments but also for local administrators and managers to enable clinical nurses to meet present and future job requirements.
The electronic transfer of information and aerospace knowledge diffusion
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E.; Bishop, Ann P.; Barclay, Rebecca O.; Kennedy, John M.
1992-01-01
Increasing reliance on and investment in information technology and electronic networking systems presupposes that computing and information technology will play a motor role in the diffusion of aerospace knowledge. Little is known, however, about actual information technology needs, uses, and problems within the aerospace knowledge diffusion process. The authors state that the potential contributions of information technology to increased productivity and competitiveness will be diminished unless empirically derived knowledge regarding the information-seeking behavior of the members of the social system - those who are producing, transferring, and using scientific and technical information - is incorporated into a new technology policy framework. Research into the use of information technology and electronic networks by U.S. aerospace engineers and scientists, collected as part of a research project designed to study aerospace knowledge diffusion, is presented in support of this assertion.
Local Approximation and Hierarchical Methods for Stochastic Optimization
NASA Astrophysics Data System (ADS)
Cheng, Bolong
In this thesis, we present local and hierarchical approximation methods for two classes of stochastic optimization problems: optimal learning and Markov decision processes. For the optimal learning problem class, we introduce a locally linear model with radial basis function for estimating the posterior mean of the unknown objective function. The method uses a compact representation of the function which avoids storing the entire history, as is typically required by nonparametric methods. We derive a knowledge gradient policy with the locally parametric model, which maximizes the expected value of information. We show the policy is asymptotically optimal in theory, and experimental works suggests that the method can reliably find the optimal solution on a range of test functions. For the Markov decision processes problem class, we are motivated by an application where we want to co-optimize a battery for multiple revenue, in particular energy arbitrage and frequency regulation. The nature of this problem requires the battery to make charging and discharging decisions at different time scales while accounting for the stochastic information such as load demand, electricity prices, and regulation signals. Computing the exact optimal policy becomes intractable due to the large state space and the number of time steps. We propose two methods to circumvent the computation bottleneck. First, we propose a nested MDP model that structure the co-optimization problem into smaller sub-problems with reduced state space. This new model allows us to understand how the battery behaves down to the two-second dynamics (that of the frequency regulation market). Second, we introduce a low-rank value function approximation for backward dynamic programming. This new method only requires computing the exact value function for a small subset of the state space and approximate the entire value function via low-rank matrix completion. We test these methods on historical price data from the PJM Interconnect and show that it outperforms the baseline approach used in the industry.
tool for conflict management , preliminary version of which is the Computer Aided Conflict Information System. Using expert judgments to describe...1961. The combined model is more relevant during the crisis phase. The results have implications for conflict modelling. With respect to conflict ... management , there is an important implication. Since the organizational processes model may be more valid than an event interaction model, then conflict
Economic irrationality is optimal during noisy decision making
Moreland, James; Chater, Nick; Usher, Marius; Summerfield, Christopher
2016-01-01
According to normative theories, reward-maximizing agents should have consistent preferences. Thus, when faced with alternatives A, B, and C, an individual preferring A to B and B to C should prefer A to C. However, it has been widely argued that humans can incur losses by violating this axiom of transitivity, despite strong evolutionary pressure for reward-maximizing choices. Here, adopting a biologically plausible computational framework, we show that intransitive (and thus economically irrational) choices paradoxically improve accuracy (and subsequent economic rewards) when decision formation is corrupted by internal neural noise. Over three experiments, we show that humans accumulate evidence over time using a “selective integration” policy that discards information about alternatives with momentarily lower value. This policy predicts violations of the axiom of transitivity when three equally valued alternatives differ circularly in their number of winning samples. We confirm this prediction in a fourth experiment reporting significant violations of weak stochastic transitivity in human observers. Crucially, we show that relying on selective integration protects choices against “late” noise that otherwise corrupts decision formation beyond the sensory stage. Indeed, we report that individuals with higher late noise relied more strongly on selective integration. These findings suggest that violations of rational choice theory reflect adaptive computations that have evolved in response to irreducible noise during neural information processing. PMID:26929353
Economic irrationality is optimal during noisy decision making.
Tsetsos, Konstantinos; Moran, Rani; Moreland, James; Chater, Nick; Usher, Marius; Summerfield, Christopher
2016-03-15
According to normative theories, reward-maximizing agents should have consistent preferences. Thus, when faced with alternatives A, B, and C, an individual preferring A to B and B to C should prefer A to C. However, it has been widely argued that humans can incur losses by violating this axiom of transitivity, despite strong evolutionary pressure for reward-maximizing choices. Here, adopting a biologically plausible computational framework, we show that intransitive (and thus economically irrational) choices paradoxically improve accuracy (and subsequent economic rewards) when decision formation is corrupted by internal neural noise. Over three experiments, we show that humans accumulate evidence over time using a "selective integration" policy that discards information about alternatives with momentarily lower value. This policy predicts violations of the axiom of transitivity when three equally valued alternatives differ circularly in their number of winning samples. We confirm this prediction in a fourth experiment reporting significant violations of weak stochastic transitivity in human observers. Crucially, we show that relying on selective integration protects choices against "late" noise that otherwise corrupts decision formation beyond the sensory stage. Indeed, we report that individuals with higher late noise relied more strongly on selective integration. These findings suggest that violations of rational choice theory reflect adaptive computations that have evolved in response to irreducible noise during neural information processing.
ANL statement of site strategy for computing workstations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fenske, K.R.; Boxberger, L.M.; Amiot, L.W.
1991-11-01
This Statement of Site Strategy describes the procedure at Argonne National Laboratory for defining, acquiring, using, and evaluating scientific and office workstations and related equipment and software in accord with DOE Order 1360.1A (5-30-85), and Laboratory policy. It is Laboratory policy to promote the installation and use of computing workstations to improve productivity and communications for both programmatic and support personnel, to ensure that computing workstations acquisitions meet the expressed need in a cost-effective manner, and to ensure that acquisitions of computing workstations are in accord with Laboratory and DOE policies. The overall computing site strategy at ANL is tomore » develop a hierarchy of integrated computing system resources to address the current and future computing needs of the laboratory. The major system components of this hierarchical strategy are: Supercomputers, Parallel computers, Centralized general purpose computers, Distributed multipurpose minicomputers, and Computing workstations and office automation support systems. Computing workstations include personal computers, scientific and engineering workstations, computer terminals, microcomputers, word processing and office automation electronic workstations, and associated software and peripheral devices costing less than $25,000 per item.« less
NASA Astrophysics Data System (ADS)
Osorio-Murillo, C. A.; Over, M. W.; Frystacky, H.; Ames, D. P.; Rubin, Y.
2013-12-01
A new software application called MAD# has been coupled with the HTCondor high throughput computing system to aid scientists and educators with the characterization of spatial random fields and enable understanding the spatial distribution of parameters used in hydrogeologic and related modeling. MAD# is an open source desktop software application used to characterize spatial random fields using direct and indirect information through Bayesian inverse modeling technique called the Method of Anchored Distributions (MAD). MAD relates indirect information with a target spatial random field via a forward simulation model. MAD# executes inverse process running the forward model multiple times to transfer information from indirect information to the target variable. MAD# uses two parallelization profiles according to computational resources available: one computer with multiple cores and multiple computers - multiple cores through HTCondor. HTCondor is a system that manages a cluster of desktop computers for submits serial or parallel jobs using scheduling policies, resources monitoring, job queuing mechanism. This poster will show how MAD# reduces the time execution of the characterization of random fields using these two parallel approaches in different case studies. A test of the approach was conducted using 1D problem with 400 cells to characterize saturated conductivity, residual water content, and shape parameters of the Mualem-van Genuchten model in four materials via the HYDRUS model. The number of simulations evaluated in the inversion was 10 million. Using the one computer approach (eight cores) were evaluated 100,000 simulations in 12 hours (10 million - 1200 hours approximately). In the evaluation on HTCondor, 32 desktop computers (132 cores) were used, with a processing time of 60 hours non-continuous in five days. HTCondor reduced the processing time for uncertainty characterization by a factor of 20 (1200 hours reduced to 60 hours.)
Development of a HIPAA-compliant environment for translational research data and analytics.
Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C
2014-01-01
High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.
Science, Society, and Social Networking
NASA Astrophysics Data System (ADS)
White, K. S.; Lohwater, T.
2009-12-01
The increased use of social networking is changing the way that scientific societies interact with their members and others. The American Association for the Advancement of Science (AAAS) uses a variety of online networks to engage its members and the broader scientific community. AAAS members and non-members can interact with AAAS staff and each other on AAAS sites on Facebook, YouTube, and Twitter, as well as blogs and forums on the AAAS website (www.aaas.org). These tools allow scientists to more readily become engaged in policy by providing information on current science policy topics as well as methods of involvement. For example, members and the public can comment on policy-relevant stories from Science magazine’s ScienceInsider blog, download a weekly policy podcast, receive a weekly email update of policy issues affecting the scientific community, or watch a congressional hearing from their computer. AAAS resource websites and outreach programs, including Communicating Science (www.aaas.org/communicatingscience), Working with Congress (www.aaas.org/spp/cstc/) and Science Careers (http://sciencecareers.sciencemag.org) also provide tools for scientists to become more personally engaged in communicating their findings and involved in the policy process.
Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio
2012-08-23
Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.
Fernández-Alemán, José Luis; Toval, Ambrosio
2012-01-01
Background Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information. Objective To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. Methods We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. Results The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Conclusions Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low. PMID:22917868
Information security: where computer science, economics and psychology meet.
Anderson, Ross; Moore, Tyler
2009-07-13
Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.
Insider Alert 1.0 Beta Version
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, Robert
2004-02-01
Insider Alert 1.0 Beta Version supports interactive selection and graphical display of data generated by the Sandia Cognitive Framework, which simulates the examination of security data by experts of various specialties. Insider Alert also encompasses the configuration and data files input to the Cognitive Framework for this application. Insider Alert 1.0 Beta Version is a computer program for analyzing data indicative of possible espionage or improper handling of data by employees at Sandia National Laboratories (or other facilities with comparable policies and procedures for managing sensitive information) It prioritizes and displays information for review by security analysts.
Kahouei, Mehdi; Baba Mohammadi, Hassan; Askari Majdabadi, Hesamedin; Solhi, Mahnaz; Parsania, Zeinab; Said Roghani, Panoe; Firozeh, Mehri
2014-02-01
For almost fifteen years, the application of computer in hospitals increasingly has become popular. Nurses' beliefs and attitudes towards computer is one of the most important indicators of the application of nursing information system. The purpose of this study was to investigate the perceptions of nurses on the usefulness of nursing information system for patient care. Here, a descriptive study was carried out. Sample was consisted of 316 nurses working in teaching hospitals in an urban area of Iran. This study was conducted during 2011 to 2012. A reliable and valid questionnaire was developed as a data collection tool. The collected data was analyzed using descriptive and inferential statistics. It was not believed that nursing information system was useful for patient care. However, it was mentioned that nursing information system is useful in some aspects of patient care such as expediting care, making early diagnosis and formulating diet plan. A significant association was found between the demographic background of sample and their perceptions of the usefulness of nursing information system (P<0.05). Totally, it can be concluded that nursing information system has a potential for improving patient care in hospital settings. Therefore, policy makers should consider implementing nursing information system in teaching hospitals.
ERIC Educational Resources Information Center
Gulson, Kalervo N.; Webb, P. Taylor
2017-01-01
Contemporary education policy involves the integration of novel forms of data and the creation of new data platforms, in addition to the infusion of business principles into school governance networks, and intensification of socio-technical relations. In this paper, we examine how "computational rationality" may be understood as…
Pavement maintenance optimization model using Markov Decision Processes
NASA Astrophysics Data System (ADS)
Mandiartha, P.; Duffield, C. F.; Razelan, I. S. b. M.; Ismail, A. b. H.
2017-09-01
This paper presents an optimization model for selection of pavement maintenance intervention using a theory of Markov Decision Processes (MDP). There are some particular characteristics of the MDP developed in this paper which distinguish it from other similar studies or optimization models intended for pavement maintenance policy development. These unique characteristics include a direct inclusion of constraints into the formulation of MDP, the use of an average cost method of MDP, and the policy development process based on the dual linear programming solution. The limited information or discussions that are available on these matters in terms of stochastic based optimization model in road network management motivates this study. This paper uses a data set acquired from road authorities of state of Victoria, Australia, to test the model and recommends steps in the computation of MDP based stochastic optimization model, leading to the development of optimum pavement maintenance policy.
A Semantic Based Policy Management Framework for Cloud Computing Environments
ERIC Educational Resources Information Center
Takabi, Hassan
2013-01-01
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Legal ramifications of intellectual property
NASA Technical Reports Server (NTRS)
Kempf, Robert F.
1990-01-01
Recent government policy changes that have resulted in encouraging or requiring increased intellectual property rights of federally funded research and development activities are examined. The reasons for these changes are discussed, including considerations related to technology transfer, patent rights, copyrights, trade secrets, and computer software issues. The effect of these changes on traditional approaches to the dissemination of federally funded scientific and technical information is considered and predictions concerning future trends in intellectual property rights are given.
Legal ramifications of intellectual property
NASA Technical Reports Server (NTRS)
Kempf, Robert F.
1990-01-01
Recent government policy changes that have resulted in encouraging or requiring increased intellectual property rights of Federally funded research and development activities are examined. The reasons for these changes are discussed, including considerations related to technology transfer, patent rights, copyrights, trade secrets, and computer software issues. The effect of these changes on traditional approaches to the dissemination of Federally funded scientific and technical information is considered and predictions concerning future trends in intellectual property rights are given.
NASA Astrophysics Data System (ADS)
Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin
2017-10-01
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.
... Admissibility Policy Leave Policy Specialty Definition Hospice & Palliative Medicine Certifying Exam About the Exam How to Apply Related Policies Exam Admissibility Policy Leave Policy FAQs Application Process Computer Exams General Surgery QE General Surgery CE Certification ...
NASA Technical Reports Server (NTRS)
Pinelli, Thomas E.; Bishop, Ann P.; Barclay, Rebecca O.; Kennedy, John M.
1992-01-01
Increasing reliance on and investment in information technology and electronic networking systems presupposes that computing and information technology will play a major role in the diffusion of aerospace knowledge. Little is known, however, about actual information technology needs, uses, and problems within the aerospace knowledge diffusion process. The authors state that the potential contributions of information technology to increased productivity and competitiveness will be diminished unless empirically derived knowledge regarding the information-seeking behavior of the members of the social system - those who are producing, transferring, and using scientific and technical information - is incorporated into a new technology policy framework. Research into the use of information technology and electronic networks by U.S. aerospace engineers and scientists, collected as part of a research project designed to study aerospace knowledge diffusion, is presented in support of this assertion.
Cyber-Security Issues in Healthcare Information Technology.
Langer, Steve G
2017-02-01
In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.
Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S. Cenk; Shimizu, Chisato; Burns, Jane C.; Wright, Victoria J.; Png, Eileen; Hibberd, Martin L.; Lloyd, David D.; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S.; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila
2017-01-01
Abstract Motivation: We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. Results: To demonstrate PRINCESS’ performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). Availability and Implementation: https://github.com/achenfengb/PRINCESS_opensource Contact: shw070@ucsd.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:28065902
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... Wesolowski, Director, Verifications Policy & Operations Branch, Division of Eligibility and Enrollment Policy..., electronic interfaces and an on-line system for the verification of eligibility. PURPOSE(S) OF THE MATCHING... Security number (SSN) verifications, (2) a death indicator, (3) an indicator of a finding of disability by...
A JAVA-based multimedia tool for clinical practice guidelines.
Maojo, V; Herrero, C; Valenzuela, F; Crespo, J; Lazaro, P; Pazos, A
1997-01-01
We have developed a specific language for the representation of Clinical Practice Guidelines (CPGs) and Windows C++ and platform independent JAVA applications for multimedia presentation and edition of electronically stored CPGs. This approach facilitates translation of guidelines and protocols from paper to computer-based flowchart representations. Users can navigate through the algorithm with a friendly user interface and access related multimedia information within the context of each clinical problem. CPGs can be stored in a computer server and distributed over the World Wide Web, facilitating dissemination, local adaptation, and use as a reference element in medical care. We have chosen the Agency for Health Care and Policy Research's heart failure guideline to demonstrate the capabilities of our tool.
Toward a Policy for Managing the Use of Computer Mediated Communication in the Workplace.
ERIC Educational Resources Information Center
Swanson, Douglas J.
Noting that there has been tremendous growth in the number of businesses and not-for-profit organizations which have become equipped with computers and have empowered workers to communicate with them, this paper sheds light on policy issues related to managing the use of computer mediated communication (CMC). The paper first summarizes CMC's…
The politics of participation in watershed modeling.
Korfmacher, K S
2001-02-01
While researchers and decision-makers increasingly recognize the importance of public participation in environmental decision-making, there is less agreement about how to involve the public. One of the most controversial issues is how to involve citizens in producing scientific information. Although this question is relevant to many areas of environmental policy, it has come to the fore in watershed management. Increasingly, the public is becoming involved in the sophisticated computer modeling efforts that have been developed to inform watershed management decisions. These models typically have been treated as technical inputs to the policy process. However, model-building itself involves numerous assumptions, judgments, and decisions that are relevant to the public. This paper examines the politics of public involvement in watershed modeling efforts and proposes five guidelines for good practice for such efforts. Using these guidelines, I analyze four cases in which different approaches to public involvement in the modeling process have been attempted and make recommendations for future efforts to involve communities in watershed modeling. Copyright 2001 Springer-Verlag
Photonics: Maintaining competitiveness in the information era
NASA Astrophysics Data System (ADS)
Photonics concerns the use of photons to work with or to replace electrons in certain communications, computer, or control applications traditionally carried out by electronics. It is a key high-technology area, well established in long-distance fiber-optic telecommunications and rapidly growing in other areas of great importance to society. This report concentrates on technical areas where the overall worldwide market for equipment approaches $400 billion per year, i.e., Telecommunications; Information processing; Optical storage and display; Optical sensors; and Policy Issues. It is essential to increase our industrial competitiveness in product development, manufacturing skills, and marketing; There must be continuing industrial effort in long-range research and innovation; The photonics industry should consider the advantages of an industry association that could help organize consortia to conduct cooperative research and address technical problems and policy issues beyond the scope of any one organization; and Government contractors who receive a percentage of sales for their independent research should devote a sizable fraction to projects with a life span of 5 to 10 years.
Commission 5: Documentation and Astronomical Data
NASA Astrophysics Data System (ADS)
Norris, Raymond P.; Ohishi, Masatoshi; Genova, Françoise; Grothkopf, Uta; Malkov, Oleg Yu.; Pence, William D.; Schmitz, Marion; Hanisch, Robert J.; Zhou, Xu
IAU Commission 5 deals with data management issues, and its working groups and task groups deal specifically with information handling, with data centres and networks, with technical aspects of collection, archiving, storage and dissemination of data, with designations and classification of astronomical objects, with library services, editorial policies, computer communications, ad hoc methodologies, and with various standards, reference frames, etc., FITS, astronomys Flexible Image Transport System, the major data exchange format, is controlled, maintained and updated by the Working Group FITS.
Supply Chain Risk Management: An Introduction to the Credible Threat
2016-08-01
connected. All we have to do is pull out our phones, tablets, laptops or any other similar device and get the information we need virtually...with the sup ply chain, especially when it comes to the use of electronics, computers and other computerized components. The attempt to remove or...Trusted StateoftheArt Microelectronics Strategy Study ,“ July 2015, Potomac Institute for Policy Studies report. Figure 2. An Organization’s
The relationship of race to women's use of health information resources.
Nicholson, Wanda K; Grason, Holly A; Powe, Neil R
2003-02-01
The purpose of this study was to examine, among the general public, the independent effect of race on women's use of health information resources. A population-based random-digit dialing survey of adult women, aged 18 to 64 years, was conducted between October 1999 and January 2000. Subjects included 509 women (341 white women, 135 black women, and 33 women of other races). The response rate was 66%. The main outcome variable was the use of health information resources (print health or news media, broadcast media, computer resources [Internet], health organizations, organized health events). Logistic regression was used to determine the independent effect of race/ethnicity on the use of different information resources, with an adjustment for age, income, education, and marital status. After the adjustment for socioeconomic factors, black women had <50% odds of using print news media (odds ratio, 0.5; 95% CI, 0.4-0.8), <60% odds of using computer-based resources (odds ratio, 0.4; 95% CI, 0.2-0.6), and <70% odds of using health policy organizations (odds ratio, 0.3; 95% CI, 0.2-0.7), compared with white women. There is a large racial disparity in women's use of health information resources. Traditional sources that are used to provide patient information may not be effective in certain populations.
5 CFR 294.201 - Public information policy.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Office. (b) The Assistant Director for Public Affairs carries out the public information policy of the... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Public information policy. 294.201... AVAILABILITY OF OFFICIAL INFORMATION The Public Information Function § 294.201 Public information policy. (a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Webb, Erik Karl; Tidwell, Vincent Carroll
2009-10-01
This document outlines ways to more effectively communicate with U.S. Federal decision makers by outlining the structure, authority, and motivations of various Federal groups, how to find the trusted advisors, and how to structure communication. All three branches of Federal governments have decision makers engaged in resolving major policy issues. The Legislative Branch (Congress) negotiates the authority and the resources that can be used by the Executive Branch. The Executive Branch has some latitude in implementation and prioritizing resources. The Judicial Branch resolves disputes. The goal of all decision makers is to choose and implement the option that best fitsmore » the needs and wants of the community. However, understanding the risk of technical, political and/or financial infeasibility and possible unintended consequences is extremely difficult. Primarily, decision makers are supported in their deliberations by trusted advisors who engage in the analysis of options as well as the day-to-day tasks associated with multi-party negotiations. In the best case, the trusted advisors use many sources of information to inform the process including the opinion of experts and if possible predictive analysis from which they can evaluate the projected consequences of their decisions. The paper covers the following: (1) Understanding Executive and Legislative decision makers - What can these decision makers do? (2) Finding the target audience - Who are the internal and external trusted advisors? (3) Packaging the message - How do we parse and integrate information, and how do we use computer simulation or models in policy communication?« less
A service brokering and recommendation mechanism for better selecting cloud services.
Gui, Zhipeng; Yang, Chaowei; Xia, Jizhe; Huang, Qunying; Liu, Kai; Li, Zhenlong; Yu, Manzhu; Sun, Min; Zhou, Nanyin; Jin, Baoxuan
2014-01-01
Cloud computing is becoming the new generation computing infrastructure, and many cloud vendors provide different types of cloud services. How to choose the best cloud services for specific applications is very challenging. Addressing this challenge requires balancing multiple factors, such as business demands, technologies, policies and preferences in addition to the computing requirements. This paper recommends a mechanism for selecting the best public cloud service at the levels of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). A systematic framework and associated workflow include cloud service filtration, solution generation, evaluation, and selection of public cloud services. Specifically, we propose the following: a hierarchical information model for integrating heterogeneous cloud information from different providers and a corresponding cloud information collecting mechanism; a cloud service classification model for categorizing and filtering cloud services and an application requirement schema for providing rules for creating application-specific configuration solutions; and a preference-aware solution evaluation mode for evaluating and recommending solutions according to the preferences of application providers. To test the proposed framework and methodologies, a cloud service advisory tool prototype was developed after which relevant experiments were conducted. The results show that the proposed system collects/updates/records the cloud information from multiple mainstream public cloud services in real-time, generates feasible cloud configuration solutions according to user specifications and acceptable cost predication, assesses solutions from multiple aspects (e.g., computing capability, potential cost and Service Level Agreement, SLA) and offers rational recommendations based on user preferences and practical cloud provisioning; and visually presents and compares solutions through an interactive web Graphical User Interface (GUI).
Astolfi, Roberto; Lorenzoni, Luca; Oderkirk, Jillian
2012-09-01
Concerns about health care expenditure growth and its long-term sustainability have risen to the top of the policy agenda in many OECD countries. As continued growth in spending places pressure on government budgets, health services provision and patients' personal finances, policy makers have launched forecasting projects to support policy planning. This comparative analysis reviewed 25 models that were developed for policy analysis in OECD countries by governments, research agencies, academics and international organisations. We observed that the policy questions that need to be addressed drive the choice of forecasting model and the model's specification. By considering both the level of aggregation of the units analysed and the level of detail of health expenditure to be projected, we identified three classes of models: micro, component-based, and macro. Virtually all models account for demographic shifts in the population, while two important influences on health expenditure growth that are the least understood include technological innovation and health-seeking behaviour. The landscape for health forecasting models is dynamic and evolving. Advances in computing technology and increases in data granularity are opening up new possibilities for the generation of system of models which become an on-going decision support tool capable of adapting to new questions as they arise. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
IMPACT: a generic tool for modelling and simulating public health policy.
Ainsworth, J D; Carruthers, E; Couch, P; Green, N; O'Flaherty, M; Sperrin, M; Williams, R; Asghar, Z; Capewell, S; Buchan, I E
2011-01-01
Populations are under-served by local health policies and management of resources. This partly reflects a lack of realistically complex models to enable appraisal of a wide range of potential options. Rising computing power coupled with advances in machine learning and healthcare information now enables such models to be constructed and executed. However, such models are not generally accessible to public health practitioners who often lack the requisite technical knowledge or skills. To design and develop a system for creating, executing and analysing the results of simulated public health and healthcare policy interventions, in ways that are accessible and usable by modellers and policy-makers. The system requirements were captured and analysed in parallel with the statistical method development for the simulation engine. From the resulting software requirement specification the system architecture was designed, implemented and tested. A model for Coronary Heart Disease (CHD) was created and validated against empirical data. The system was successfully used to create and validate the CHD model. The initial validation results show concordance between the simulation results and the empirical data. We have demonstrated the ability to connect health policy-modellers and policy-makers in a unified system, thereby making population health models easier to share, maintain, reuse and deploy.
An economic and financial exploratory
NASA Astrophysics Data System (ADS)
Cincotti, S.; Sornette, D.; Treleaven, P.; Battiston, S.; Caldarelli, G.; Hommes, C.; Kirman, A.
2012-11-01
This paper describes the vision of a European Exploratory for economics and finance using an interdisciplinary consortium of economists, natural scientists, computer scientists and engineers, who will combine their expertise to address the enormous challenges of the 21st century. This Academic Public facility is intended for economic modelling, investigating all aspects of risk and stability, improving financial technology, and evaluating proposed regulatory and taxation changes. The European Exploratory for economics and finance will be constituted as a network of infrastructure, observatories, data repositories, services and facilities and will foster the creation of a new cross-disciplinary research community of social scientists, complexity scientists and computing (ICT) scientists to collaborate in investigating major issues in economics and finance. It is also considered a cradle for training and collaboration with the private sector to spur spin-offs and job creations in Europe in the finance and economic sectors. The Exploratory will allow Social Scientists and Regulators as well as Policy Makers and the private sector to conduct realistic investigations with real economic, financial and social data. The Exploratory will (i) continuously monitor and evaluate the status of the economies of countries in their various components, (ii) use, extend and develop a large variety of methods including data mining, process mining, computational and artificial intelligence and every other computer and complex science techniques coupled with economic theory and econometric, and (iii) provide the framework and infrastructure to perform what-if analysis, scenario evaluations and computational, laboratory, field and web experiments to inform decision makers and help develop innovative policy, market and regulation designs.
Ifinedo, Princely
2018-01-01
Background: This paper used the Theory of Planned Behavior (TPB), which was extended, to investigate nurses’ adoption of healthcare information systems (HIS) in Nova Scotia, Canada. Methods: Data was collected from 197 nurses in a survey and data analysis was carried out using the partial least squares (PLS) technique. Results: In contrast to findings in prior studies that used TPB to investigate clinicians’ adoption of technologies in Canada and elsewhere, this study found no statistical significance for the relationships between attitude and subjective norm in relation to nurses’ intention to use HIS. Rather, facilitating organizational conditions was the only TPB variable that explained sampled nurses’ intention to use HIS at work. In particular, effects of computer habit and computer anxiety among older nurses were signified. Conclusion: To encourage nurses’ adoption of HIS, healthcare administrators need to pay attention to facilitating organization conditions at work. Enhancing computer knowledge or competence is important for acceptance. Information presented in the study can be used by administrators of healthcare facilities in the research location and comparable parts of the world to further improve HIS adoption among nurses. The management of nursing professionals, especially in certain contexts (eg, prevalence of older nursing professionals), can make use of this study’s insights. PMID:29626399
1982-11-01
Pihilips lIiAO i:l ()(xxsclrn prtixics, tor full -tcsr storagec onr ultra high dkrisit\\ I cad-tirtl digit al optical tiascrl discs, wiul th. fxast rctricx...activity, and hence gain full employment in other sectors of the society. The whole issue of the employment effects of informatics will be taken up later in...mini- and micro-computers and of more or less intelligent peripherals. However, this is still doubtful unless a full compre- hension of the political
[Information security in health care].
Ködmön, József; Csajbók, Zoltán Ernő
2015-07-05
Doctors, nurses and other medical professionals are spending more and more time in front of the computer, using applications developed for general practitioners, specialized care, or perhaps an integrated hospital system. The data they handle during healing and patient care are mostly sensitive data and, therefore, their management is strictly regulated. Finding our way in the jungle of laws, regulations and policies is not simple. Notwithstanding, our lack of information does not waive our responsibility. This study summarizes the most important points of international recommendations, standards and legal regulations of the field, as well as giving practical advices for managing medical and patient data securely and in compliance with the current legal regulations.
Health Information Exchange as a Complex and Adaptive Construct: Scoping Review.
Akhlaq, Ather; Sheikh, Aziz; Pagliari, Claudia
2017-01-25
To understand how the concept of Health Information Exchange (HIE) has evolved over time. Supplementary analysis of data from a systematic scoping review of definitions of HIE from 1900 to 2014, involving temporal analysis of underpinning themes. The search identified 268 unique definitions of HIE dating from 1957 onwards; 103 in scientific databases and 165 in Google. These contained consistent themes, representing the core concept of exchanging health information electronically, as well as fluid themes, reflecting the evolving policy, business, organisational and technological context of HIE (including the emergence of HIE as an organisational 'entity'). These are summarised graphically to show how the concept has evolved around the world with the passage of time. The term HIE emerged in 1957 with the establishment of Occupational HIE, evolving through the 1990s with concepts such as electronic data interchange and mobile computing technology; then from 2006-10 largely aligning with the US Government's health information technology strategy and the creation of HIEs as organisational entities, alongside the broader interoperability imperative, and continuing to evolve today as part of a broader international agenda for sustainable, information-driven health systems. The concept of HIE is an evolving and adaptive one, reflecting the ongoing quest for integrated and interoperable information to improve the efficiency and effectiveness of health systems, in a changing technological and policy environment.
NASA Astrophysics Data System (ADS)
Bataille, Christopher G. F.
2005-11-01
Are further energy efficiency gains, or more recently greenhouse gas reductions, expensive or cheap? Analysts provide conflicting advice to policy makers based on divergent modelling perspectives, a 'top-down/bottom-up debate' in which economists use equation based models that equilibrate markets by maximizing consumer welfare, and technologists use technology simulation models that minimize the financial cost of providing energy services. This thesis summarizes a long term research project to find a middle ground between these two positions that is more useful to policy makers. Starting with the individual components of a behaviourally realistic and technologically explicit simulation model (ISTUM---Inter Sectoral Technology Use Model), or "hybrid", the individual sectors of the economy are linked using a framework of micro and macro economic feedbacks. These feedbacks are taken from the economic theory that informs the computable general equilibrium (CGE) family of models. Speaking in the languages of both economists and engineers, the resulting "physical" equilibrium model of Canada (CIMS---Canadian Integrated Modeling System), equilibrates energy and end-product markets, including imports and exports, for seven regions and 15 economic sectors, including primary industry, manufacturing, transportation, commerce, residences, governmental infrastructure and the energy supply sectors. Several different policy experiments demonstrate the value-added of the model and how its results compare to top-down and bottom-up practice. In general, the results show that technical adjustments make up about half the response to simulated energy policy, and macroeconomic demand adjustments the other half. Induced technical adjustments predominate with minor policies, while the importance of macroeconomic demand adjustment increases with the strength of the policy. Results are also shown for an experiment to derive estimates of future elasticity of substitution (ESUB) and autonomous energy efficiency indices (AEEI) from the model, parameters that could be used in long-run computable general equilibrium (CGE) analysis. The thesis concludes with a summary of the strengths and weakness of the new model as a policy tool, a work plan for its further improvement, and a discussion of the general potential for technologically explicit general equilibrium modelling.
New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)
NASA Astrophysics Data System (ADS)
Bratus, Sergey; Locasto, Michael E.; Ramaswamy, Ashwin; Smith, Sean W.
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result, we believe that the focus of the Trusted Computing (TC) discipline must naturally shift from the design and implementation of the hardware root of trust (and the subsequent trust chain) to the higher-level application policies. Such policies must build on these primitives to express new sets of security goals. We highlight the relationship between enforcing these types of policies and debugging, since both activities establish the link between expected and actual application behavior. We argue that this new class of policies better fits developers' mental models of expected application behaviors, and we suggest a hardware design direction for enabling the efficient interpretation of such policies.
2012-01-01
Background Policies targeting obesogenic environments and behaviours are critical to counter rising obesity rates and lifestyle-related non-communicable diseases (NCDs). Policies are likely to be most effective and enduring when they are based on the best available evidence. Evidence-informed policy making is especially challenging in countries with limited resources. The Pacific TROPIC (Translational Research for Obesity Prevention in Communities) project aims to implement and evaluate a tailored knowledge-brokering approach to evidence-informed policy making to address obesity in Fiji, a Pacific nation challenged by increasingly high rates of obesity and concomitant NCDs. Methods The TROPIC project draws on the concept of ‘knowledge exchange’ between policy developers (individuals; organisations) and researchers to deliver a knowledge broking programme that maps policy environments, conducts workshops on evidence-informed policy making, supports the development of evidence-informed policy briefs, and embeds evidence-informed policy making into organisational culture. Recruitment of government and nongovernment organisational representatives will be based on potential to: develop policies relevant to obesity, reach broad audiences, and commit to resourcing staff and building a culture that supports evidence-informed policy development. Workshops will increase awareness of both obesity and policy cycles, as well as develop participants’ skills in accessing, assessing and applying relevant evidence to policy briefs. The knowledge-broking team will then support participants to: 1) develop evidence-informed policy briefs that are both commensurate with national and organisational plans and also informed by evidence from the Pacific Obesity Prevention in Communities project and elsewhere; and 2) collaborate with participating organisations to embed evidence-informed policy making structures and processes. This knowledge broking initiative will be evaluated via data from semi-structured interviews, a validated self-assessment tool, process diaries and outputs. Discussion Public health interventions have rarely targeted evidence-informed policy making structures and processes to reduce obesity and NCDs. This study will empirically advance understanding of knowledge broking processes to extend evidence-informed policy making skills and develop a suite of national obesity-related policies that can potentially improve population health outcomes. PMID:22830984
75 FR 16088 - Proposed Information Quality Guidelines Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-31
... ELECTION ASSISTANCE COMMISSION Proposed Information Quality Guidelines Policy AGENCY: U.S... Quality Guidelines Policy. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Information Quality Guidelines policy. The policy outlines the EAC's directives and...
Agovino, Massimiliano; Cerciello, Massimiliano; Gatto, Andrea
2018-07-15
This work introduces a revised version of the Food Sustainability Index, proposed by the Economist Intelligence Unit and the Barilla Center for Food and Nutrition in 2016. Our Adjusted Food Sustainability Index features two important advantages: 1) it employs the Mazziotta-Pareto method to compute weights, hence granting an objective aggregation criterion and 2) it does not take policy variables into account, thus focusing on the status quo. The policy variables are aggregated into the Policy Index, measuring the quality of the food sustainability policies. We compute the two indices for 25 countries worldwide, then we use the Data Envelopment Analysis to evaluate policy efficiency. Our results show that country-level variation in policy efficiency is wide and policies affect food sustainability significantly, especially when they target nutritional challenges. Copyright © 2018 Elsevier Ltd. All rights reserved.
An Assessment of the Dyna-Metric Inventory Model during Initial Provisioning.
1986-09-01
model for computing initial spares levels. Currently, Air Force 3 policy for the provisioning of initial spares and repair parts requires that "all...Force inventory. The key to an effective inventory policy , and a credible defense posture in times of a constrained budget, is to maximize the repair... policy and procedures for deciding which items qualify for stockage, and for computing new requirements for all types of initially provisioned items
Cartographic Communication and Information Policy.
ERIC Educational Resources Information Center
van de Waal, E. Hans
Trends in information policy are discussed as they impact on cartographic information, stressing particularly the relationships between cartographic communication, documentation, and policy making. Distinction is made between cartographic communication as a subject for information policy and cartographic communication as an expedient in public…
2015-03-01
a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on
2010-04-30
delivered enhances both the teaching and learning processes. • The number of students engaged in focused acquisition research for their MBA projects...Meyers, US Navy—Lieutenant Nicholas Meyers is an MBA student in the Graduate School of Business & Public Policy at the Naval Postgraduate School . LT...Theoretic Computer Science Mathematics and Operations Research Werner Heisenberg-Weg 39 85577 Neubiberg, Germany Phone +49 89 6004 2400 Abstract
Strehlenert, H; Richter-Sundberg, L; Nyström, M E; Hasson, H
2015-12-08
Evidence has come to play a central role in health policymaking. However, policymakers tend to use other types of information besides research evidence. Most prior studies on evidence-informed policy have focused on the policy formulation phase without a systematic analysis of its implementation. It has been suggested that in order to fully understand the policy process, the analysis should include both policy formulation and implementation. The purpose of the study was to explore and compare two policies aiming to improve health and social care in Sweden and to empirically test a new conceptual model for evidence-informed policy formulation and implementation. Two concurrent national policies were studied during the entire policy process using a longitudinal, comparative case study approach. Data was collected through interviews, observations, and documents. A Conceptual Model for Evidence-Informed Policy Formulation and Implementation was developed based on prior frameworks for evidence-informed policymaking and policy dissemination and implementation. The conceptual model was used to organize and analyze the data. The policies differed regarding the use of evidence in the policy formulation and the extent to which the policy formulation and implementation phases overlapped. Similarities between the cases were an emphasis on capacity assessment, modified activities based on the assessment, and a highly active implementation approach relying on networks of stakeholders. The Conceptual Model for Evidence-Informed Policy Formulation and Implementation was empirically useful to organize the data. The policy actors' roles and functions were found to have a great influence on the choices of strategies and collaborators in all policy phases. The Conceptual Model for Evidence-Informed Policy Formulation and Implementation was found to be useful. However, it provided insufficient guidance for analyzing actors involved in the policy process, capacity-building strategies, and overlapping policy phases. A revised version of the model that includes these aspects is suggested.
Information flow analysis and Petri-net-based modeling for welding flexible manufacturing cell
NASA Astrophysics Data System (ADS)
Qiu, T.; Chen, Shanben; Wang, Y. T.; Wu, Lin
2000-10-01
Due to the development of advanced manufacturing technology and the introduction of Smart-Manufacturing notion in the field of modern industrial production, welding flexible manufacturing system (WFMS) using robot technology has become the inevitable developing direction on welding automation. In WFMS process, the flexibility for different welding products and the realizing on corresponding welding parameters control are the guarantees for welding quality. Based on a new intelligent arc-welding flexible manufacturing cell (WFMC), the system structure and control policies are studied in this paper. Aiming at the different information flows among every subsystem and central monitoring computer in this WFMC, Petri net theory is introduced into the process of welding manufacturing. With its help, a discrete control model of WFMC has been constructed, in which the system status is regarded as place and the control process is regarded as transition. Moreover, grounded on automation Petri net principle, the judging and utilizing of information obtained from welding sensors are imported into net structure, which extends the traditional Petri net concepts. The control model and policies researched in this paper have established foundation for further intelligent real-time control on WFMC and WFMS.
The GMOS cyber(e)-infrastructure: advanced services for supporting science and policy.
Cinnirella, S; D'Amore, F; Bencardino, M; Sprovieri, F; Pirrone, N
2014-03-01
The need for coordinated, systematized and catalogued databases on mercury in the environment is of paramount importance as improved information can help the assessment of the effectiveness of measures established to phase out and ban mercury. Long-term monitoring sites have been established in a number of regions and countries for the measurement of mercury in ambient air and wet deposition. Long term measurements of mercury concentration in biota also produced a huge amount of information, but such initiatives are far from being within a global, systematic and interoperable approach. To address these weaknesses the on-going Global Mercury Observation System (GMOS) project ( www.gmos.eu ) established a coordinated global observation system for mercury as well it retrieved historical data ( www.gmos.eu/sdi ). To manage such large amount of information a technological infrastructure was planned. This high-performance back-end resource associated with sophisticated client applications enables data storage, computing services, telecommunications networks and all services necessary to support the activity. This paper reports the architecture definition of the GMOS Cyber(e)-Infrastructure and the services developed to support science and policy, including the United Nation Environmental Program. It finally describes new possibilities in data analysis and data management through client applications.
78 FR 25521 - Notice for Data and Information Distribution Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-01
... restrictions. The scope of this policy does not include requests for historical FAA data or information whose... information published via FAA Web sites is not within the scope of this policy. DATES: Any written information... CONTACT: You may direct any questions on data/ information policy to the NAS Data Management staff by...
Orencio, Pedcris M; Fujii, Masahiko
2013-02-01
A coastal community vulnerability index (CCVI) was constructed to evaluate the vulnerability of coastal communities (Buhangin, Pingit, Reserva, Sabang, and Zabali) in the municipality of Baler, Aurora, Philippines. This index was composed of weighted averages of seven vulnerability factors namely geographical, economic and livelihood, food security, environmental, policy and institutional, demographic, and capital good. Factor values were computed based on scores that described range of conditions that influence communities' susceptibility to hazard effects. Among the factors evaluated, economic and livelihood, policy and institutional and food security contributed to CCVI across communities. Only small variations on CCVI values (i.e., 0.47-0.53) were observed as factor values cancelled out one another during combination process. Overall, Sabang received the highest CCVI, which was contributed mainly by geographical and demographic factors. This technique to determine factors that influenced communities' vulnerability can provide information for local governments in enhancing policies on risk mitigation and adaptation.
Lee, Chankyun; Cao, Xiaoyuan; Yoshikane, Noboru; Tsuritani, Takehiro; Rhee, June-Koo Kevin
2015-10-19
The feasibility of software-defined optical networking (SDON) for a practical application critically depends on scalability of centralized control performance. The paper, highly scalable routing and wavelength assignment (RWA) algorithms are investigated on an OpenFlow-based SDON testbed for proof-of-concept demonstration. Efficient RWA algorithms are proposed to achieve high performance in achieving network capacity with reduced computation cost, which is a significant attribute in a scalable centralized-control SDON. The proposed heuristic RWA algorithms differ in the orders of request processes and in the procedures of routing table updates. Combined in a shortest-path-based routing algorithm, a hottest-request-first processing policy that considers demand intensity and end-to-end distance information offers both the highest throughput of networks and acceptable computation scalability. We further investigate trade-off relationship between network throughput and computation complexity in routing table update procedure by a simulation study.
Towards Web-based representation and processing of health information
Gao, Sheng; Mioc, Darka; Yi, Xiaolun; Anton, Francois; Oldfield, Eddie; Coleman, David J
2009-01-01
Background There is great concern within health surveillance, on how to grapple with environmental degradation, rapid urbanization, population mobility and growth. The Internet has emerged as an efficient way to share health information, enabling users to access and understand data at their fingertips. Increasingly complex problems in the health field require increasingly sophisticated computer software, distributed computing power, and standardized data sharing. To address this need, Web-based mapping is now emerging as an important tool to enable health practitioners, policy makers, and the public to understand spatial health risks, population health trends and vulnerabilities. Today several web-based health applications generate dynamic maps; however, for people to fully interpret the maps they need data source description and the method used in the data analysis or statistical modeling. For the representation of health information through Web-mapping applications, there still lacks a standard format to accommodate all fixed (such as location) and variable (such as age, gender, health outcome, etc) indicators in the representation of health information. Furthermore, net-centric computing has not been adequately applied to support flexible health data processing and mapping online. Results The authors of this study designed a HEalth Representation XML (HERXML) schema that consists of the semantic (e.g., health activity description, the data sources description, the statistical methodology used for analysis), geometric, and cartographical representations of health data. A case study has been carried on the development of web application and services within the Canadian Geospatial Data Infrastructure (CGDI) framework for community health programs of the New Brunswick Lung Association. This study facilitated the online processing, mapping and sharing of health information, with the use of HERXML and Open Geospatial Consortium (OGC) services. It brought a new solution in better health data representation and initial exploration of the Web-based processing of health information. Conclusion The designed HERXML has been proven to be an appropriate solution in supporting the Web representation of health information. It can be used by health practitioners, policy makers, and the public in disease etiology, health planning, health resource management, health promotion and health education. The utilization of Web-based processing services in this study provides a flexible way for users to select and use certain processing functions for health data processing and mapping via the Web. This research provides easy access to geospatial and health data in understanding the trends of diseases, and promotes the growth and enrichment of the CGDI in the public health sector. PMID:19159445
Survey of equipment in general practice.
Bradley, N.; Watkins, S.
1989-01-01
Partners in general practice have to buy any equipment they want themselves. As a result partners in high investing practices have lower net incomes. Of the 297 practices in Devon and Cornwall, 265 responded to a questionnaire listing 115 possible items of practice equipment. Overall, practices seemed to be fairly well equipped. Key findings were that 193 of those who responded had an electrocardiograph, 206 had a kit for minor operations, 119 owned a computer, and less than one third owned a microscope. Most of these practices were high investors. There seems to be a shift away from some traditional instruments towards expensive information technology. Government policies are encouraging the use of computers and such equipment, though funds are not necessarily being made available for this purpose. PMID:2507005
49 CFR 806.1 - General policy.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INFORMATION POLICY AND GUIDELINES, IMPLEMENTING REGULATIONS § 806.1 General policy. (a) The interests of the United States and its citizens are best served by making information regarding the affairs... the Freedom of Information Act and in the current public information policies of the executive branch...
Archer, Charles Jens; Musselman, Roy Glenn; Peters, Amanda; Pinnow, Kurt Walter; Swartz, Brent Allen; Wallenfelt, Brian Paul
2010-11-23
A massively parallel computer system contains an inter-nodal communications network of node-to-node links. Nodes vary a choice of routing policy for routing data in the network in a semi-random manner, so that similarly situated packets are not always routed along the same path. Semi-random variation of the routing policy tends to avoid certain local hot spots of network activity, which might otherwise arise using more consistent routing determinations. Preferably, the originating node chooses a routing policy for a packet, and all intermediate nodes in the path route the packet according to that policy. Policies may be rotated on a round-robin basis, selected by generating a random number, or otherwise varied.
Policies | High-Performance Computing | NREL
Use Learn about policy governing user accountability, resource use, use by foreign nationals states. Data Security Learn about the data security policy, including data protection, data security retention policy, including project-centric and user-centric data. Shared Storage Usage Learn about a policy
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
5 CFR 2411.4 - Information policy.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Information policy. 2411.4 Section 2411.4... AUTHORITY AND FEDERAL SERVICE IMPASSES PANEL GENERAL PROVISIONS AVAILABILITY OF OFFICIAL INFORMATION § 2411.4 Information policy. (a) Authority/General Counsel/Panel/IG. (1) It is the policy of the Authority...
Efficient Privacy-Aware Record Integration.
Kuzu, Mehmet; Kantarcioglu, Murat; Inan, Ali; Bertino, Elisa; Durham, Elizabeth; Malin, Bradley
2013-01-01
The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to whom the information corresponds. Various private record linkage (PRL) protocols have been proposed to achieve this goal, involving secure multi-party computation (SMC) and similarity preserving data transformation techniques. SMC methods provide secure and accurate solutions to the PRL problem, but are prohibitively expensive in practice, mainly due to excessive computational requirements. Data transformation techniques offer more practical solutions, but incur the cost of information leakage and false matches. In this paper, we introduce a novel model for practical PRL, which 1) affords controlled and limited information leakage, 2) avoids false matches resulting from data transformation. Initially, we partition the data sources into blocks to eliminate comparisons for records that are unlikely to match. Then, to identify matches, we apply an efficient SMC technique between the candidate record pairs. To enable efficiency and privacy, our model leaks a controlled amount of obfuscated data prior to the secure computations. Applied obfuscation relies on differential privacy which provides strong privacy guarantees against adversaries with arbitrary background knowledge. In addition, we illustrate the practical nature of our approach through an empirical analysis with data derived from public voter records.
A Service Brokering and Recommendation Mechanism for Better Selecting Cloud Services
Gui, Zhipeng; Yang, Chaowei; Xia, Jizhe; Huang, Qunying; Liu, Kai; Li, Zhenlong; Yu, Manzhu; Sun, Min; Zhou, Nanyin; Jin, Baoxuan
2014-01-01
Cloud computing is becoming the new generation computing infrastructure, and many cloud vendors provide different types of cloud services. How to choose the best cloud services for specific applications is very challenging. Addressing this challenge requires balancing multiple factors, such as business demands, technologies, policies and preferences in addition to the computing requirements. This paper recommends a mechanism for selecting the best public cloud service at the levels of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). A systematic framework and associated workflow include cloud service filtration, solution generation, evaluation, and selection of public cloud services. Specifically, we propose the following: a hierarchical information model for integrating heterogeneous cloud information from different providers and a corresponding cloud information collecting mechanism; a cloud service classification model for categorizing and filtering cloud services and an application requirement schema for providing rules for creating application-specific configuration solutions; and a preference-aware solution evaluation mode for evaluating and recommending solutions according to the preferences of application providers. To test the proposed framework and methodologies, a cloud service advisory tool prototype was developed after which relevant experiments were conducted. The results show that the proposed system collects/updates/records the cloud information from multiple mainstream public cloud services in real-time, generates feasible cloud configuration solutions according to user specifications and acceptable cost predication, assesses solutions from multiple aspects (e.g., computing capability, potential cost and Service Level Agreement, SLA) and offers rational recommendations based on user preferences and practical cloud provisioning; and visually presents and compares solutions through an interactive web Graphical User Interface (GUI). PMID:25170937
77 FR 50543 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-21
... Communications and Information Policy The Department of State's Advisory Committee on International Communications and Information Policy (ACICIP) will hold a public meeting on October 2, 2012 from 9:00 a.m. to 12... issues and problems in international communications and information policy, especially as these issues...
Trust information-based privacy architecture for ubiquitous health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko
2013-10-08
Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems' measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications.
Trust Information-Based Privacy Architecture for Ubiquitous Health
2013-01-01
Background Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. Objective The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. Methods A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. Results The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems’ measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. Conclusions The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications. PMID:25099213
NASA Astrophysics Data System (ADS)
Rose, K.; Glosser, D.; Bauer, J. R.; Barkhurst, A.
2015-12-01
The products of spatial analyses that leverage the interpolation of sparse, point data to represent continuous phenomena are often presented without clear explanations of the uncertainty associated with the interpolated values. As a result, there is frequently insufficient information provided to effectively support advanced computational analyses and individual research and policy decisions utilizing these results. This highlights the need for a reliable approach capable of quantitatively producing and communicating spatial data analyses and their inherent uncertainties for a broad range of uses. To address this need, we have developed the Variable Grid Method (VGM), and associated Python tool, which is a flexible approach that can be applied to a variety of analyses and use case scenarios where users need a method to effectively study, evaluate, and analyze spatial trends and patterns while communicating the uncertainty in the underlying spatial datasets. The VGM outputs a simultaneous visualization representative of the spatial data analyses and quantification of underlying uncertainties, which can be calculated using data related to sample density, sample variance, interpolation error, uncertainty calculated from multiple simulations, etc. We will present examples of our research utilizing the VGM to quantify key spatial trends and patterns for subsurface data interpolations and their uncertainties and leverage these results to evaluate storage estimates and potential impacts associated with underground injection for CO2 storage and unconventional resource production and development. The insights provided by these examples identify how the VGM can provide critical information about the relationship between uncertainty and spatial data that is necessary to better support their use in advance computation analyses and informing research, management and policy decisions.
BUILD: A community development simulation game, appendix A
NASA Technical Reports Server (NTRS)
Orlando, J. A.; Pennington, A. J.
1973-01-01
The computer based urban decision-making game BUILD is described. BUILD is aimed at: (1) allowing maximum expression of value positions by participants through resolution of intense, task-oriented conflicts: (2) heuristically gathering information on both the technical and social functioning of the city through feedback from participants: (3) providing community participants with access to technical expertise in urban decision making, and to expose professionals to the value positions of the community: and (4) laying the groundwork for eventual development of an actual policy making tool. A brief description of the roles, sample input/output formats, an initial scenario, and information on accessing the game through a time-sharing system are included.
Informal alcohol in Malawi: stakeholder perceptions and policy recommendations.
Limaye, Rupali J; Rutkow, Lainie; Rimal, Rajiv N; Jernigan, David H
2014-02-01
Through the eyes of those involved in the alcohol policy-making process in Malawi, we explored the role of informal (non-commercial) alcohol in rural communities, its harmful effects, and implications for appropriate national policy. Harms included early drinking initiation, violence, and sexual risk exposure. Informants suggested that policy should address informal alcohol's content, selling times, and easy access. Because most informal alcohol producers are women who rely upon sales for subsistence, policies must avoid limiting women's economic opportunities while protecting community health.
Evidence Report: Risk of Inadequate Human-Computer Interaction
NASA Technical Reports Server (NTRS)
Holden, Kritina; Ezer, Neta; Vos, Gordon
2013-01-01
Human-computer interaction (HCI) encompasses all the methods by which humans and computer-based systems communicate, share information, and accomplish tasks. When HCI is poorly designed, crews have difficulty entering, navigating, accessing, and understanding information. HCI has rarely been studied in an operational spaceflight context, and detailed performance data that would support evaluation of HCI have not been collected; thus, we draw much of our evidence from post-spaceflight crew comments, and from other safety-critical domains like ground-based power plants, and aviation. Additionally, there is a concern that any potential or real issues to date may have been masked by the fact that crews have near constant access to ground controllers, who monitor for errors, correct mistakes, and provide additional information needed to complete tasks. We do not know what types of HCI issues might arise without this "safety net". Exploration missions will test this concern, as crews may be operating autonomously due to communication delays and blackouts. Crew survival will be heavily dependent on available electronic information for just-in-time training, procedure execution, and vehicle or system maintenance; hence, the criticality of the Risk of Inadequate HCI. Future work must focus on identifying the most important contributing risk factors, evaluating their contribution to the overall risk, and developing appropriate mitigations. The Risk of Inadequate HCI includes eight core contributing factors based on the Human Factors Analysis and Classification System (HFACS): (1) Requirements, policies, and design processes, (2) Information resources and support, (3) Allocation of attention, (4) Cognitive overload, (5) Environmentally induced perceptual changes, (6) Misperception and misinterpretation of displayed information, (7) Spatial disorientation, and (8) Displays and controls.
[How to establish the hospital information system security policies].
Gong, Qing-Yue; Shi, Cheng
2008-03-01
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Public computing options for individuals with cognitive impairments: survey outcomes.
Fox, Lynn Elizabeth; Sohlberg, McKay Moore; Fickas, Stephen; Lemoncello, Rik; Prideaux, Jason
2009-09-01
To examine availability and accessibility of public computing for individuals with cognitive impairment (CI) who reside in the USA. A telephone survey was administered as a semi-structured interview to 145 informants representing seven types of public facilities across three geographically distinct regions using a snowball sampling technique. An Internet search of wireless (Wi-Fi) hotspots supplemented the survey. Survey results showed the availability of public computer terminals and Internet hotspots was greatest in the urban sample, followed by the mid-sized and rural cities. Across seven facility types surveyed, libraries had the highest percentage of access barriers, including complex queue procedures, login and password requirements, and limited technical support. University assistive technology centres and facilities with a restricted user policy, such as brain injury centres, had the lowest incidence of access barriers. Findings suggest optimal outcomes for people with CI will result from a careful match of technology and the user that takes into account potential barriers and opportunities to computing in an individual's preferred public environments. Trends in public computing, including the emergence of widespread Wi-Fi and limited access to terminals that permit auto-launch applications, should guide development of technology designed for use in public computing environments.
ERIC Educational Resources Information Center
Richardson, Linda B., Comp.; And Others
This collection includes four handouts: (1) "Selection Critria Considerations for Computer-Based Resources" (Linda B. Richardson); (2) "Software Collection Policies in Academic Libraries" (a 24-item bibliography, Jane W. Johnson); (3) "Circulation and Security of Software" (a 19-item bibliography, Sara Elizabeth Williams); and (4) "Bibliography of…
ERIC Educational Resources Information Center
Perry, James L.; Kraemer, Kenneth L.
1978-01-01
Argues that innovation attributes, together with policies associated with the diffusion on an innovation, account for significant differences in diffusion patterns. An empirical analysis of this thesis focuses on the diffusion of computer applications software in local government. Available from Elsevier Scientific Publishing Co., Box 211,…
Intelligent Control of a Sensor-Actuator System via Kernelized Least-Squares Policy Iteration
Liu, Bo; Chen, Sanfeng; Li, Shuai; Liang, Yongsheng
2012-01-01
In this paper a new framework, called Compressive Kernelized Reinforcement Learning (CKRL), for computing near-optimal policies in sequential decision making with uncertainty is proposed via incorporating the non-adaptive data-independent Random Projections and nonparametric Kernelized Least-squares Policy Iteration (KLSPI). Random Projections are a fast, non-adaptive dimensionality reduction framework in which high-dimensionality data is projected onto a random lower-dimension subspace via spherically random rotation and coordination sampling. KLSPI introduce kernel trick into the LSPI framework for Reinforcement Learning, often achieving faster convergence and providing automatic feature selection via various kernel sparsification approaches. In this approach, policies are computed in a low-dimensional subspace generated by projecting the high-dimensional features onto a set of random basis. We first show how Random Projections constitute an efficient sparsification technique and how our method often converges faster than regular LSPI, while at lower computational costs. Theoretical foundation underlying this approach is a fast approximation of Singular Value Decomposition (SVD). Finally, simulation results are exhibited on benchmark MDP domains, which confirm gains both in computation time and in performance in large feature spaces. PMID:22736969
ERIC Educational Resources Information Center
Dickson, Ian, Ed.; Dwyer, Lisa, Ed.
The 18 papers presented at this conference address national information policies, information for industry, and electronic publishing. The titles of the papers are as follows: (1) "Industrial Information Policies of Developing Countries" (keynote address, Sung Jin Choi); (2) "National Information Policy. Current Trends and…
ERIC Educational Resources Information Center
Higgins, Adrian T.
This Federal Library and Information Center Committee (FLICC) Forum on Federal Information Policies focused on the impact of OMB (Office of Management and Budget) Circular A-130, which revises administration policy on information dissemination and the use of automated systems by federal agencies. Introductory remarks by James P. Riley, Kent A.…
Composition of web services using Markov decision processes and dynamic programming.
Uc-Cetina, Víctor; Moo-Mena, Francisco; Hernandez-Ucan, Rafael
2015-01-01
We propose a Markov decision process model for solving the Web service composition (WSC) problem. Iterative policy evaluation, value iteration, and policy iteration algorithms are used to experimentally validate our approach, with artificial and real data. The experimental results show the reliability of the model and the methods employed, with policy iteration being the best one in terms of the minimum number of iterations needed to estimate an optimal policy, with the highest Quality of Service attributes. Our experimental work shows how the solution of a WSC problem involving a set of 100,000 individual Web services and where a valid composition requiring the selection of 1,000 services from the available set can be computed in the worst case in less than 200 seconds, using an Intel Core i5 computer with 6 GB RAM. Moreover, a real WSC problem involving only 7 individual Web services requires less than 0.08 seconds, using the same computational power. Finally, a comparison with two popular reinforcement learning algorithms, sarsa and Q-learning, shows that these algorithms require one or two orders of magnitude and more time than policy iteration, iterative policy evaluation, and value iteration to handle WSC problems of the same complexity.
Pappas, Yannis; Anandan, Chantelle; Liu, Joseph; Car, Josip; Sheikh, Aziz; Majeed, Azeem
2011-01-01
A computer-assisted history-taking system (CAHTS) is a tool that aids clinicians in gathering data from patients to inform a diagnosis or treatment plan. Despite the many possible applications and even though CAHTS have been available for nearly three decades, these remain underused in routine clinical practice. Through an interpretative review of the literature, we provide an overview of the field of CAHTS, which also offers an understanding of the impact of these systems on policy, practice and research. We conducted a search and critique of the literature on CAHTS. Using a comprehensive set of terms, we searched: MEDLINE, EMBASE, The Cochrane Database of Systematic Reviews, Database of Abstracts of Reviews of Effects, The Cochrane Central Register of Controlled Trials, The Cochrane Methodology Register, Health Technology Assessment Database and the NHS Economic Evaluation Database over a ten-year period (January 1997 to May 2007) to identify systematic reviews, technical reports and health technology assessments, and randomised controlled trials. The systematic review of the literature suggests that CAHTS can save professionals' time, improve delivery of care to those with special needs and also facilitate the collection of information, especially potentially sensitive information (e.g. sexual history, alcohol consumption). The use of CAHTS also has disadvantages that impede the process of history taking and may pose risks to patients. CAHTS are inherently limited when detecting non-verbal communication, may pose irrelevant questions and frustrate the users with technical problems. Our review suggests that barriers such as a preference for pen-and-paper methods and concerns about data loss and security still exist and affect the adoption of CAHTS. In terms of policy and practice, CAHTS make input of data from disparate sites possible, which facilitates work from disparate sites and the collection of data for nationwide screening programmes such as the vascular risk assessment programme for people aged 40-74, now starting in England. Our review shows that for CAHTS to be adopted in mainstream health care, important changes should take place in how we conceive, plan and conduct primary and secondary research on the topic so that we provide the framework for a comprehensive evaluation that will lead to an evidence base to inform policy and practice.
ECOLOGICAL POLICY: DEFINING APPROPRIATE ROLES FOR SCIENCE AND SCIENTISTS - 8/2006
Resolving many ecological policy issues requires an array of scientific information. The ability of scientists (and scientific information) to constructively inform policy deliberations diminishes when what is offered as "science" is inculcated with personal policy preferences. S...
29 CFR 1401.21 - Information policy.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 4 2012-07-01 2012-07-01 false Information policy. 1401.21 Section 1401.21 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE PUBLIC INFORMATION Production or Disclosure of Information § 1401.21 Information policy. (a) Except for matters specifically...
Dubé, C; Ribble, C; Kelton, D; McNab, B
2009-04-01
Livestock movements are important in spreading infectious diseases and many countries have developed regulations that require farmers to report livestock movements to authorities. This has led to the availability of large amounts of data for analysis and inclusion in computer simulation models developed to support policy formulation. Social network analysis has become increasingly popular to study and characterize the networks resulting from the movement of livestock from farm-to-farm and through other types of livestock operations. Network analysis is a powerful tool that allows one to study the relationships created among these operations, providing information on the role that they play in acquiring and spreading infectious diseases, information that is not readily available from more traditional livestock movement studies. Recent advances in the study of real-world complex networks are now being applied to veterinary epidemiology and infectious disease modelling and control. A review of the principles of network analysis and of the relevance of various complex network theories to infectious disease modelling and control is presented in this paper.
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2014 CFR
2014-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2012 CFR
2012-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2010 CFR
2010-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2011 CFR
2011-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2013 CFR
2013-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
NASA Astrophysics Data System (ADS)
Ohl, Ricky
In this case study, computer supported argument visualisation has been applied to the analysis and representation of the draft South East Queensland Regional Plan Consultation discourse, demonstrating how argument mapping can help deliver the transparency and accountability required in participatory democracy. Consultative democracy for regional planning falls into a category of problems known as “wicked problems”. Inherent in this environment is heterogeneous viewpoints, agendas and voices, built on disparate and often contradictory logic. An argument ontology and notation that was designed specifically to deal with consultative urban planning around wicked problems is the Issue Based Information System (IBIS) and IBIS notation (Rittel & Webber, 1984). The software used for argument visualisation in this case was Compendium, a derivative of IBIS. The high volume of stakeholders and discourse heterogeneity in this environment calls for a unique approach to argument mapping. The map design model developed from this research has been titled a “Consultation Map”. The design incorporates the IBIS ontology within a hybrid of mapping approaches, amalgamating elements from concept, dialogue, argument, debate, thematic and tree-mapping. The consultation maps developed from the draft South East Queensland Regional Plan Consultation provide a transparent visual record to give evidence of the themes of citizen issues within the consultation discourse. The consultation maps also link the elicited discourse themes to related policies from the SEQ Regional Plan providing explicit evidence of SEQ Regional Plan policy-decisions matching citizen concerns. The final consultation map in the series provides explicit links between SEQ Regional Plan policy items and monitoring activities reporting on the ongoing implementation of the SEQ Regional Plan. This map provides updatable evidence of and accountability for SEQ Regional Plan policy implementation and developments.
NASA Astrophysics Data System (ADS)
Lengert, Wolfgang; Farres, Jordi; Lanari, Riccardo; Casu, Francesco; Manunta, Michele; Lassalle-Balier, Gerard
2014-05-01
Helix Nebula has established a growing public private partnership of more than 30 commercial cloud providers, SMEs, and publicly funded research organisations and e-infrastructures. The Helix Nebula strategy is to establish a federated cloud service across Europe. Three high-profile flagships, sponsored by CERN (high energy physics), EMBL (life sciences) and ESA/DLR/CNES/CNR (earth science), have been deployed and extensively tested within this federated environment. The commitments behind these initial flagships have created a critical mass that attracts suppliers and users to the initiative, to work together towards an "Information as a Service" market place. Significant progress in implementing the following 4 programmatic goals (as outlined in the strategic Plan Ref.1) has been achieved: × Goal #1 Establish a Cloud Computing Infrastructure for the European Research Area (ERA) serving as a platform for innovation and evolution of the overall infrastructure. × Goal #2 Identify and adopt suitable policies for trust, security and privacy on a European-level can be provided by the European Cloud Computing framework and infrastructure. × Goal #3 Create a light-weight governance structure for the future European Cloud Computing Infrastructure that involves all the stakeholders and can evolve over time as the infrastructure, services and user-base grows. × Goal #4 Define a funding scheme involving the three stake-holder groups (service suppliers, users, EC and national funding agencies) into a Public-Private-Partnership model to implement a Cloud Computing Infrastructure that delivers a sustainable business environment adhering to European level policies. Now in 2014 a first version of this generic cross-domain e-infrastructure is ready to go into operations building on federation of European industry and contributors (data, tools, knowledge, ...). This presentation describes how Helix Nebula is being used in the domain of earth science focusing on geohazards. The so called "Supersite Exploitation Platform" (SSEP) provides scientists an overarching federated e-infrastructure with a very fast access to (i) large volume of data (EO/non-space data), (ii) computing resources (e.g. hybrid cloud/grid), (iii) processing software (e.g. toolboxes, RTMs, retrieval baselines, visualization routines), and (iv) general platform capabilities (e.g. user management and access control, accounting, information portal, collaborative tools, social networks etc.). In this federation each data provider remains in full control of the implementation of its data policy. This presentation outlines the Architecture (technical and services) supporting very heterogeneous science domains as well as the procedures for new-comers to join the Helix Nebula Market Place. Ref.1 http://cds.cern.ch/record/1374172/files/CERN-OPEN-2011-036.pdf
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Měsíček, Libor; Choi, Jongsun
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.
Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
78 FR 24749 - Health Information Technology Policy Committee Appointment
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-26
... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Appointment AGENCY... Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee to make recommendations on the implementation of a nationwide health information technology...
Emadi Andani, Mehran; Bahrami, Fariba
2012-10-01
Flash and Hogan (1985) suggested that the CNS employs a minimum jerk strategy when planning any given movement. Later, Nakano et al. (1999) showed that minimum angle jerk predicts the actual arm trajectory curvature better than the minimum jerk model. Friedman and Flash (2009) confirmed this claim. Besides the behavioral support that we will discuss, we will show that this model allows simplicity in planning any given movement. In particular, we prove mathematically that each movement that satisfies the minimum joint angle jerk condition is reproducible by a linear combination of six functions. These functions are calculated independent of the type of the movement and are normalized in the time domain. Hence, we call these six universal functions the Movement Elements (ME). We also show that the kinematic information at the beginning and end of the movement determines the coefficients of the linear combination. On the other hand, in analyzing recorded data from sit-to-stand (STS) transfer, arm-reaching movement (ARM) and gait, we observed that minimum joint angle jerk condition is satisfied only during different successive phases of these movements and not for the entire movement. Driven by these observations, we assumed that any given ballistic movement may be decomposed into several successive phases without overlap, such that for each phase the minimum joint angle jerk condition is satisfied. At the boundaries of each phase the angular acceleration of each joint should obtain its extremum (zero third derivative). As a consequence, joint angles at each phase will be linear combinations of the introduced MEs. Coefficients of the linear combination at each phase are the values of the joint kinematics at the boundaries of that phase. Finally, we conclude that these observations may constitute the basis of a computational interpretation, put differently, of the strategy used by the Central Nervous System (CNS) for motor planning. We call this possible interpretation "Coordinated Minimum Angle jerk Policy" or COMAP. Based on this policy, the function of the CNS in generating the desired pattern of any given task (like STS, ARM or gait) can be described computationally using three factors: (1) the kinematics of the motor system at given body states, i.e., at certain movement events/instances, (2) the time length of each phase, and (3) the proposed MEs. From a computational point of view, this model significantly simplifies the processes of movement planning as well as feature abstraction for saving characterizing information of any given movement in memory. Copyright © 2012 Elsevier B.V. All rights reserved.
Soldiers in the Blogosphere Using New Media to Help Win the War for Public Opinion
2009-04-01
relaxed its policy on blogging, but still bans the use of community networking sites such as MySpace on government computers . The Army has practically...of community networking sites such as MySpace on government computers . The Army has practically ignored these new media sources to get its story...its policy on blogging, but still bans the use of community networking sites such as MySpace on government computers . The Army has practically
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...
NASA Astrophysics Data System (ADS)
Spak, S.; Pooley, M.
2012-12-01
The next generation of coupled human and earth systems models promises immense potential and grand challenges as they transition toward new roles as core tools for defining and living within planetary boundaries. New frontiers in community model development include not only computational, organizational, and geophysical process questions, but also the twin objectives of more meaningfully integrating the human dimension and extending applicability to informing policy decisions on a range of new and interconnected issues. We approach these challenges by posing key policy questions that require more comprehensive coupled human and geophysical models, identify necessary model and organizational processes and outputs, and work backwards to determine design criteria in response to these needs. We find that modular community earth system model design must: * seamlessly scale in space (global to urban) and time (nowcasting to paleo-studies) and fully coupled on all component systems * automatically differentiate to provide complete coupled forward and adjoint models for sensitivity studies, optimization applications, and 4DVAR assimilation across Earth and human observing systems * incorporate diagnostic tools to quantify uncertainty in couplings, and in how human activity affects them * integrate accessible community development and application with JIT-compilation, cloud computing, game-oriented interfaces, and crowd-sourced problem-solving We outline accessible near-term objectives toward these goals, and describe attempts to incorporate these design objectives in recent pilot activities using atmosphere-land-ocean-biosphere-human models (WRF-Chem, IBIS, UrbanSim) at urban and regional scales for policy applications in climate, energy, and air quality.
Stodden, Victoria; Guo, Peixuan; Ma, Zhaokun
2013-01-01
Journal policy on research data and code availability is an important part of the ongoing shift toward publishing reproducible computational science. This article extends the literature by studying journal data sharing policies by year (for both 2011 and 2012) for a referent set of 170 journals. We make a further contribution by evaluating code sharing policies, supplemental materials policies, and open access status for these 170 journals for each of 2011 and 2012. We build a predictive model of open data and code policy adoption as a function of impact factor and publisher and find higher impact journals more likely to have open data and code policies and scientific societies more likely to have open data and code policies than commercial publishers. We also find open data policies tend to lead open code policies, and we find no relationship between open data and code policies and either supplemental material policies or open access journal status. Of the journals in this study, 38% had a data policy, 22% had a code policy, and 66% had a supplemental materials policy as of June 2012. This reflects a striking one year increase of 16% in the number of data policies, a 30% increase in code policies, and a 7% increase in the number of supplemental materials policies. We introduce a new dataset to the community that categorizes data and code sharing, supplemental materials, and open access policies in 2011 and 2012 for these 170 journals.
Stodden, Victoria; Guo, Peixuan; Ma, Zhaokun
2013-01-01
Journal policy on research data and code availability is an important part of the ongoing shift toward publishing reproducible computational science. This article extends the literature by studying journal data sharing policies by year (for both 2011 and 2012) for a referent set of 170 journals. We make a further contribution by evaluating code sharing policies, supplemental materials policies, and open access status for these 170 journals for each of 2011 and 2012. We build a predictive model of open data and code policy adoption as a function of impact factor and publisher and find higher impact journals more likely to have open data and code policies and scientific societies more likely to have open data and code policies than commercial publishers. We also find open data policies tend to lead open code policies, and we find no relationship between open data and code policies and either supplemental material policies or open access journal status. Of the journals in this study, 38% had a data policy, 22% had a code policy, and 66% had a supplemental materials policy as of June 2012. This reflects a striking one year increase of 16% in the number of data policies, a 30% increase in code policies, and a 7% increase in the number of supplemental materials policies. We introduce a new dataset to the community that categorizes data and code sharing, supplemental materials, and open access policies in 2011 and 2012 for these 170 journals. PMID:23805293
Gordon, Abekah Nkrumah; Hinson, Robert Ebo
2007-01-01
The purpose of this paper is to argue for a theoretical framework by which development of computer based health information systems (CHIS) can be made sustainable. Health Management and promotion thrive on well-articulated CHIS. There are high levels of risk associated with the development of CHIS in the context of least developed countries (LDC), thereby making them unsustainable. This paper is based largely on literature survey on health promotion and information systems. The main factors accounting for the sustainability problem in less developed countries include poor infrastructure, inappropriate donor policies and strategies, poor infrastructure and inadequate human resource capacity. To counter these challenges and to ensure that CHIS deployment in LDCs is sustainable, it is proposed that the activities involved in the implementation of these systems be incorporated into organizational routines. This will ensure and secure the needed resources as well as the relevant support from all stakeholders of the system; on a continuous basis. This paper sets out to look at the issue of CHIS sustainability in LDCs, theoretically explains the factors that account for the sustainability problem and develops a conceptual model based on theoretical literature and existing empirical findings.
NASA Technical Reports Server (NTRS)
Hernon, Peter; Pinelli, Thomas E.
1992-01-01
With its contribution to trade, its coupling with national security, and its symbolism of U.S. technological strength, the U.S. aerospace industry holds a unique position in the Nation's industrial structure. Federal science and technology policy and Federal scientific and technical information (STI) policy loom important as strategic contributions to the U.S. aerospace industry's leading competitive position. However, three fundamental policy problems exist. First, the United States lacks a coherent STI policy and a unified approach to the development of such a policy. Second, policymakers fail to understand the relationship of STI to science and technology policy. Third, STI is treated as a part of general information policy, without any recognition of its uniqueness. This paper provides an overview of the Federal information policy structure as it relates to STI and frames the policy issues that require resolution.
NASA Technical Reports Server (NTRS)
Hernon, Peter; Pinelli, Thomas E.
1992-01-01
With its contribution to trade, its coupling with national security, and its symbolism of U.S. technological strength, the U.S. aerospace industry holds a unique position in the Nation's industrial structure. Federal science and technology policy and Federal scientific and technical information (STI) policy loom important as strategic contributions to the U.S. aerospace industry's leading competitive position. However, three fundamental policy problems exist. First, the United States lacks a coherent STI policy and a unified approach to the development of such a policy. Second, policymakers fail to understand the relationship of STI to science and technology policy. Third, STI is treated as a part of general information policy, without any recognition of its uniqueness. This paper provides an overview of the Federal information policy structure as it relates to STI and frames the policy issues that require resolution.
Automatic Residential/Commercial Classification of Parcels with Solar Panel Detections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morton, April M; Omitaomu, Olufemi A; Kotikot, Susan
A computational method to automatically detect solar panels on rooftops to aid policy and financial assessment of solar distributed generation. The code automatically classifies parcels containing solar panels in the U.S. as residential or commercial. The code allows the user to specify an input dataset containing parcels and detected solar panels, and then uses information about the parcels and solar panels to automatically classify the rooftops as residential or commercial using machine learning techniques. The zip file containing the code includes sample input and output datasets for the Boston and DC areas.
Commission 5: Documentation and Astronomical Data
NASA Astrophysics Data System (ADS)
Ohishi, Masatoshi; Hanisch, Robert J.; Norris, Ray P.; Andernach, Heinz; Bishop, Marsha; Griffin, Elizabeth; Kembhavi, Ajit; Murphy, Tara; Pasian, Fabio
2012-04-01
IAU Commission 5 (http://www.nao.ac.jp/IAU/Com5/) deals with data management issues, and its working groups and task group deal specifically with information handling, with data centers and networks, with technical aspects of collection, archiving, storage and dissemination of data, with designations and classification of astronomical objects, with library services, editorial policies, computer communications, ad hoc methodologies, and with various standards, reference frames, etc. FITS (Flexible Image Transport System), the major data exchange format in astronomy, has been standardized, maintained and updated by the FITS working group under Commission 5.
IEEE 1982. Proceedings of the international conference on cybernetics and society
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1982-01-01
The following topics were dealt with: knowledge-based systems; risk analysis; man-machine interactions; human information processing; metaphor, analogy and problem-solving; manual control modelling; transportation systems; simulation; adaptive and learning systems; biocybernetics; cybernetics; mathematical programming; robotics; decision support systems; analysis, design and validation of models; computer vision; systems science; energy systems; environmental modelling and policy; pattern recognition; nuclear warfare; technological forecasting; artificial intelligence; the Turin shroud; optimisation; workloads. Abstracts of individual papers can be found under the relevant classification codes in this or future issues.
AIDS: The Role of Imaging Modalities and Infection Control Policies
Moore-Stovall, Joyce
1988-01-01
The availability of imaging modalities, such as the chest radiograph, gallium scan, double-contrast barium enema, computed tomography, and nuclear magnetic resonance, are very helpful in the diagnosis, treatment, and follow-up evaluation of patients with acquired immunodeficiency syndrome (AIDS). Because this syndrome causes irreversible destruction of the immune system, patients are susceptible to a multitude of opportunistic infections and malignancies. Health care professionals and the general public would be less fearful and apprehensive of AIDS victims if properly informed about the communicability of this syndrome. PMID:3047412
Ligmann-Zielinska, Arika; Kramer, Daniel B; Spence Cheruvelil, Kendra; Soranno, Patricia A
2014-01-01
Agent-based models (ABMs) have been widely used to study socioecological systems. They are useful for studying such systems because of their ability to incorporate micro-level behaviors among interacting agents, and to understand emergent phenomena due to these interactions. However, ABMs are inherently stochastic and require proper handling of uncertainty. We propose a simulation framework based on quantitative uncertainty and sensitivity analyses to build parsimonious ABMs that serve two purposes: exploration of the outcome space to simulate low-probability but high-consequence events that may have significant policy implications, and explanation of model behavior to describe the system with higher accuracy. The proposed framework is applied to the problem of modeling farmland conservation resulting in land use change. We employ output variance decomposition based on quasi-random sampling of the input space and perform three computational experiments. First, we perform uncertainty analysis to improve model legitimacy, where the distribution of results informs us about the expected value that can be validated against independent data, and provides information on the variance around this mean as well as the extreme results. In our last two computational experiments, we employ sensitivity analysis to produce two simpler versions of the ABM. First, input space is reduced only to inputs that produced the variance of the initial ABM, resulting in a model with output distribution similar to the initial model. Second, we refine the value of the most influential input, producing a model that maintains the mean of the output of initial ABM but with less spread. These simplifications can be used to 1) efficiently explore model outcomes, including outliers that may be important considerations in the design of robust policies, and 2) conduct explanatory analysis that exposes the smallest number of inputs influencing the steady state of the modeled system.
Ligmann-Zielinska, Arika; Kramer, Daniel B.; Spence Cheruvelil, Kendra; Soranno, Patricia A.
2014-01-01
Agent-based models (ABMs) have been widely used to study socioecological systems. They are useful for studying such systems because of their ability to incorporate micro-level behaviors among interacting agents, and to understand emergent phenomena due to these interactions. However, ABMs are inherently stochastic and require proper handling of uncertainty. We propose a simulation framework based on quantitative uncertainty and sensitivity analyses to build parsimonious ABMs that serve two purposes: exploration of the outcome space to simulate low-probability but high-consequence events that may have significant policy implications, and explanation of model behavior to describe the system with higher accuracy. The proposed framework is applied to the problem of modeling farmland conservation resulting in land use change. We employ output variance decomposition based on quasi-random sampling of the input space and perform three computational experiments. First, we perform uncertainty analysis to improve model legitimacy, where the distribution of results informs us about the expected value that can be validated against independent data, and provides information on the variance around this mean as well as the extreme results. In our last two computational experiments, we employ sensitivity analysis to produce two simpler versions of the ABM. First, input space is reduced only to inputs that produced the variance of the initial ABM, resulting in a model with output distribution similar to the initial model. Second, we refine the value of the most influential input, producing a model that maintains the mean of the output of initial ABM but with less spread. These simplifications can be used to 1) efficiently explore model outcomes, including outliers that may be important considerations in the design of robust policies, and 2) conduct explanatory analysis that exposes the smallest number of inputs influencing the steady state of the modeled system. PMID:25340764
77 FR 27774 - Health Information Technology Policy Committee Vacancy
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-11
... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Vacancy AGENCY... American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy.... ADDRESSES: GAO: [email protected] . GAO: 441 G Street NW., Washington, DC 20548. FOR FURTHER INFORMATION...
Code of Federal Regulations, 2013 CFR
2013-10-01
...) Specific thresholds at which USDA Office of the Chief Information Officer Information Technology... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 439.101 Policy. (a) In addition to policy and regulatory guidance contained in the FAR and AGAR: (1) The USDA Information Technology Capital Planning and...
Code of Federal Regulations, 2014 CFR
2014-10-01
...) Specific thresholds at which USDA Office of the Chief Information Officer Information Technology... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 439.101 Policy. (a) In addition to policy and regulatory guidance contained in the FAR and AGAR: (1) The USDA Information Technology Capital Planning and...
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Specific thresholds at which USDA Office of the Chief Information Officer Information Technology... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 439.101 Policy. (a) In addition to policy and regulatory guidance contained in the FAR and AGAR: (1) The USDA Information Technology Capital Planning and...
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Specific thresholds at which USDA Office of the Chief Information Officer Information Technology... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 439.101 Policy. (a) In addition to policy and regulatory guidance contained in the FAR and AGAR: (1) The USDA Information Technology Capital Planning and...
The Climate Disruption Challenge for Water Security in a Growing World
NASA Astrophysics Data System (ADS)
Paxton, L. J.; Nix, M.; Ihde, A.; MacDonald, L. H.; Parker, C.; Schaefer, R. K.; Weiss, M.; Babin, S. M.; Swartz, W. H.; Schloman, J.
2012-12-01
Climate disruption, the increasingly large and erratic departures of weather and climate from the benign conditions of the last one hundred years, is the greatest challenge to the long-term stability of world governments. Population growth, food and water security, energy supplies, and economic factors are, to some degree, within the control of governance and policy and all of these are impacted by climate disruption. Climate disruption, on the other hand, is not amenable to direct modification on the short timescales that commonly dictate governmental policy and human response. Global average temperatures will continue to increase even if there were immediate, profound changes in emission scenarios. Policy makers are faced with the very practical and immediate problem of determining what can one reasonably do to ameliorate the impact of climate disruption. The issue from a policy viewpoint is: how does one make effective policy when faced with a situation in which there are varied viewpoints in competition. How does one establish a consensus for action? What information "speaks" to policy makers? Water security is one such issue and provides an important, immediate, and tangible device to use when we examine how one can determine what policies can be effectively pursued. The Global Assimilation of Information for Action (GAIA) project creates a support environment to address the impact of climate disruption on global, national, regional, and/or local interests. The basic research community is concerned with the scientific aspects of predicting climate change in terms of environmental parameters such as rainfall, temperature and humidity while decision makers must deal with planning for a world that may be very different from the one we have grown accustomed to. Decision makers must deal with the long-term impacts on public health, agriculture, economic productivity, security, extreme weather, etc in an environment that has come to focus on short-term issues. To complicate matters, the information available from the climate studies community is couched in terms of model projections with "uncertainties" and a choice of emission scenarios that are often expressed in terms of the results of computer simulations and model output. GAIA develops actionable information and explores the interactions of policy and practice. Part of this framework is the development of "games". These realistic games include the elements of both agent-based and role simulation games in which subject matter experts interact in a realistic scenario to explore courses of action and their outcomes based on realistic, projected environments. We will present examples of some of the past work done at APL and examples of collaborative or competitive games that could be used to explore climate disruption in terms of social, political, and economic impacts. These games provide immediate, "tactile" experience of the implications of a choice of policy. In this talk we will suggest how this tool can be applied to problems like the Colorado River Basin or the Brahmaputra.
Mooney, Stephen J; Magee, Caroline; Dang, Kolena; Leonard, Julie C; Yang, Jingzhen; Rivara, Frederick P; Ebel, Beth E; Rowhani-Rahbar, Ali; Quistberg, D Alex
2018-05-14
"Complete Streets" policies require transportation engineers to make provisions for pedestrians, cyclists and transit users. These policies may make bicycling safer for individual cyclists while increasing overall bicycle fatalities if more individuals cycle due to improved infrastructure. We merged county-level records of Complete Streets policies with Fatality Analysis Reporting System counts of cyclist fatalities occurring between January 2000 and December 2015. Because comprehensive county cycling estimates were not available, we used bicycle commute estimates from the American Community Survey and US Census as a proxy for the cycling population, and limited analysis to 183 counties (accounting for over half the US population) for which cycle commute estimates were consistently non-zero. We used G-computation to estimate the effect of policies on overall cyclist fatalities while also accounting for potential policy effects on the size of the cycling population. Over 16 years, 5,254 cyclists died in these counties, representing 34 fatalities per 100,000 cyclist-years. We estimated that Complete Streets policies made cycling safer, averting 0.6 fatalities per 100,000 cyclist-years (95% CI: 0.3, 1.0) by encouraging a 2.4% increase in cycling and a 0.7% increase in cyclist fatalities. G-computation is a useful tool for understanding policy impact on risk and exposure.
Big data, smart homes and ambient assisted living.
Vimarlund, V; Wass, S
2014-08-15
To discuss how current research in the area of smart homes and ambient assisted living will be influenced by the use of big data. A scoping review of literature published in scientific journals and conference proceedings was performed, focusing on smart homes, ambient assisted living and big data over the years 2011-2014. The health and social care market has lagged behind other markets when it comes to the introduction of innovative IT solutions and the market faces a number of challenges as the use of big data will increase. First, there is a need for a sustainable and trustful information chain where the needed information can be transferred from all producers to all consumers in a structured way. Second, there is a need for big data strategies and policies to manage the new situation where information is handled and transferred independently of the place of the expertise. Finally, there is a possibility to develop new and innovative business models for a market that supports cloud computing, social media, crowdsourcing etc. The interdisciplinary area of big data, smart homes and ambient assisted living is no longer only of interest for IT developers, it is also of interest for decision makers as customers make more informed choices among today's services. In the future it will be of importance to make information usable for managers and improve decision making, tailor smart home services based on big data, develop new business models, increase competition and identify policies to ensure privacy, security and liability.
Design and implementation of land reservation system
NASA Astrophysics Data System (ADS)
Gao, Yurong; Gao, Qingqiang
2009-10-01
Land reservation is defined as a land management policy for insuring the government to control primary land market. It requires the government to obtain the land first, according to plan, by purchase, confiscation and exchanging, and then exploit and consolidate the land for reservation. Underlying this policy, it is possible for the government to satisfy and manipulate the needs of land for urban development. The author designs and develops "Land Reservation System for Eastern Lake Development District" (LRSELDD), which deals with the realistic land requirement problems in Wuhan Eastern Lake Development Districts. The LRSELDD utilizes modern technologies and solutions of computer science and GIS to process multiple source data related with land. Based on experiments on the system, this paper will first analyze workflow land reservation system and design the system structure based on its principles, then illustrate the approach of organization and management of spatial data, describe the system functions according to the characteristics of land reservation and consolidation finally. The system is running to serve for current work in Eastern Lake Development Districts. It is able to scientifically manage both current and planning land information, as well as the information about land supplying. We use the LRSELDD in our routine work, and with such information, decisions on land confiscation and allocation will be made wisely and scientifically.
Conducting Nursing Research to Advance and Inform Health Policy.
Ellenbecker, Carol Hall; Edward, Jean
2016-11-01
The primary roles of nurse scientists in conducting health policy research are to increase knowledge in the discipline and provide evidence for informing and advancing health policies with the goal of improving the health outcomes of society. Health policy research informs, characterizes, explains, or tests hypotheses by employing a variety of research designs. Health policy research focuses on improving the access to care, the quality and cost of care, and the efficiency with which care is delivered. In this article, we explain how nurses might envision their research in a policy process framework, describe research designs that nurse researchers might use to inform and advance health policies, and provide examples of research conducted by nurse researchers to explicate key concepts in the policy process framework. Health policies are well informed and advanced when nurse researchers have a good understanding of the political process. The policy process framework provides a context for improving the focus and design of research and better explicating the connection between research evidence and policy. Nurses should focus their research on addressing problems of importance that are on the healthcare agenda, work with interdisciplinary teams of researchers, synthesize, and widely disseminate results.
Computational biology and bioinformatics in Nigeria.
Fatumo, Segun A; Adoga, Moses P; Ojo, Opeolu O; Oluwagbemi, Olugbenga; Adeoye, Tolulope; Ewejobi, Itunuoluwa; Adebiyi, Marion; Adebiyi, Ezekiel; Bewaji, Clement; Nashiru, Oyekanmi
2014-04-01
Over the past few decades, major advances in the field of molecular biology, coupled with advances in genomic technologies, have led to an explosive growth in the biological data generated by the scientific community. The critical need to process and analyze such a deluge of data and turn it into useful knowledge has caused bioinformatics to gain prominence and importance. Bioinformatics is an interdisciplinary research area that applies techniques, methodologies, and tools in computer and information science to solve biological problems. In Nigeria, bioinformatics has recently played a vital role in the advancement of biological sciences. As a developing country, the importance of bioinformatics is rapidly gaining acceptance, and bioinformatics groups comprised of biologists, computer scientists, and computer engineers are being constituted at Nigerian universities and research institutes. In this article, we present an overview of bioinformatics education and research in Nigeria. We also discuss professional societies and academic and research institutions that play central roles in advancing the discipline in Nigeria. Finally, we propose strategies that can bolster bioinformatics education and support from policy makers in Nigeria, with potential positive implications for other developing countries.
Computational Biology and Bioinformatics in Nigeria
Fatumo, Segun A.; Adoga, Moses P.; Ojo, Opeolu O.; Oluwagbemi, Olugbenga; Adeoye, Tolulope; Ewejobi, Itunuoluwa; Adebiyi, Marion; Adebiyi, Ezekiel; Bewaji, Clement; Nashiru, Oyekanmi
2014-01-01
Over the past few decades, major advances in the field of molecular biology, coupled with advances in genomic technologies, have led to an explosive growth in the biological data generated by the scientific community. The critical need to process and analyze such a deluge of data and turn it into useful knowledge has caused bioinformatics to gain prominence and importance. Bioinformatics is an interdisciplinary research area that applies techniques, methodologies, and tools in computer and information science to solve biological problems. In Nigeria, bioinformatics has recently played a vital role in the advancement of biological sciences. As a developing country, the importance of bioinformatics is rapidly gaining acceptance, and bioinformatics groups comprised of biologists, computer scientists, and computer engineers are being constituted at Nigerian universities and research institutes. In this article, we present an overview of bioinformatics education and research in Nigeria. We also discuss professional societies and academic and research institutions that play central roles in advancing the discipline in Nigeria. Finally, we propose strategies that can bolster bioinformatics education and support from policy makers in Nigeria, with potential positive implications for other developing countries. PMID:24763310
ERIC Educational Resources Information Center
Boehm, Barry W.
Developing countries should take immediate steps to avoid some of the serious problems that are now facing the United States in regard to the pool of trained computer professionals. Problem areas which should be reconciled involve a diverse range of topics from general national policy to salary structures and conversions efforts. By using the…
ERIC Educational Resources Information Center
Rudd, Tim
2013-01-01
This paper offers a critical analysis of the UK coalition Government's educational computing policies. It argues that such policies must be viewed in relation to the broader ideological intent underpinning their development and the neo liberal orientation that seeks to further privatise and marketise education. In examining the related…
Measuring use of research evidence in public health policy: a policy content analysis
2014-01-01
Background There are few Australian studies showing how research evidence is used to inform the development of public health policy. International research has shown that compensation for injury rehabilitation can have negative impacts on health outcomes. This study examined transport injury compensation policy in the Australian state of Victoria to: determine type and purpose of reference to information sources; and to identify the extent of reference to academic research evidence in transport related injury rehabilitation compensation policy. Methods Quantitative content analysis of injury rehabilitation compensation policies (N = 128) from the Victorian state government transport accident compensation authority. Results The most commonly referenced types of information were Internal Policy (median = 6 references per policy), Clinical/Medical (2.5), and Internal Legislation (1). Academic Research Evidence was the least often referenced source of information. The main purpose of reference to information was to support injury treatment and rehabilitation compensation claims decision-making. Conclusions Transport injury compensation policy development is complex; with multiple sources of information cited including legislation, internal policy, external policy and clinical/medical evidence. There is limited use of academic research evidence in Victorian state government injury treatment and rehabilitation compensation policies. Decisions regarding compensation for injury treatment and rehabilitation services could benefit from greater use of academic research evidence. This study is one of the first to examine the use of research evidence in existing Australian public health policy decision-making using rigorous quantitative methods. It provides a practical example of how use of research evidence in public health policy can be objectively measured. PMID:24886092
SCIENCE, SCIENTISTS, AND POLICY ADVOCACY
Effectively resolving the typical ecological policy issue requires providing an array of scientific information to decision-makers. In my experience, the ability of scientists (and scientific information) to inform constructively ecological policy deliberations has been diminishe...
Waters, Elizabeth; Armstrong, Rebecca; Swinburn, Boyd; Moore, Laurence; Dobbins, Maureen; Anderson, Laurie; Petticrew, Mark; Clark, Rachel; Conning, Rebecca; Moodie, Marj; Carter, Robert
2011-01-13
Childhood overweight and obesity is the most prevalent and, arguably, politically complex child health problem internationally. Governments, communities and industry have important roles to play, and are increasingly expected to deliver an evidence-informed system-wide prevention program. However, efforts are impeded by a lack of organisational access to and use of research evidence. This study aims to identify feasible, acceptable and ideally, effective knowledge translation (KT) strategies to increase evidence-informed decision-making in local governments, within the context of childhood obesity prevention as a national policy priority. This paper describes the methods for KT4LG, a cluster randomised controlled trial which is exploratory in nature, given the limited evidence base and methodological advances. KT4LG aims to examine a program of KT strategies to increase the use of research evidence in informing public health decisions in local governments. KT4LG will also assess the feasibility and acceptability of the intervention. The intervention program comprises a facilitated program of evidence awareness, access to tailored research evidence, critical appraisal skills development, networking and evidence summaries and will be compared to provision of evidence summaries alone in the control program. 28 local governments were randomised to intervention or control, using computer generated numbers, stratified by budget tertile (high, medium or low). Questionnaires will be used to measure impact, costs, and outcomes, and key informant interviews will be used to examine processes, feasibility, and experiences. Policy tracer studies will be included to examine impact of intervention on policies within relevant government policy documents. Knowledge translation intervention studies with a focus on public health and prevention are very few in number. Thus, this study will provide essential data on the experience of program implementation and evaluation of a system-integrated intervention program employed within the local government public health context. Standardised programs of system, organisational and individual KT strategies have not been described or rigorously evaluated. As such, the findings will make a significant contribution to understanding whether a facilitated program of KT strategies hold promise for facilitating evidence-informed public health decision making within complex multisectoral government organisations. Australia and New Zealand Clinical Trials Register (ANZCTR): ACTRN12609000953235.
Composition of Web Services Using Markov Decision Processes and Dynamic Programming
Uc-Cetina, Víctor; Moo-Mena, Francisco; Hernandez-Ucan, Rafael
2015-01-01
We propose a Markov decision process model for solving the Web service composition (WSC) problem. Iterative policy evaluation, value iteration, and policy iteration algorithms are used to experimentally validate our approach, with artificial and real data. The experimental results show the reliability of the model and the methods employed, with policy iteration being the best one in terms of the minimum number of iterations needed to estimate an optimal policy, with the highest Quality of Service attributes. Our experimental work shows how the solution of a WSC problem involving a set of 100,000 individual Web services and where a valid composition requiring the selection of 1,000 services from the available set can be computed in the worst case in less than 200 seconds, using an Intel Core i5 computer with 6 GB RAM. Moreover, a real WSC problem involving only 7 individual Web services requires less than 0.08 seconds, using the same computational power. Finally, a comparison with two popular reinforcement learning algorithms, sarsa and Q-learning, shows that these algorithms require one or two orders of magnitude and more time than policy iteration, iterative policy evaluation, and value iteration to handle WSC problems of the same complexity. PMID:25874247
Simpson, Roy L
2004-08-01
The Institute of Medicine's landmark report asserted that medical error is seldom the fault of individuals, but the result of faulty healthcare policy/procedure systems. Numerous studies have shown that information technology (IT) can shore up weak systems. For nursing, IT plays a key role in eliminating nursing mistakes. However, managing IT is a function of managing the people who use it. For nursing administrators, successful IT implementations depend on adroit management of the three 'P's: People, processes and (computer) programs. This paper examines critical issues for managing each entity. It discusses the importance of developing trusting organizations, the requirements of process change, how to implement technology in harmony with the organization and the significance of vision.
Information Technology Standards: A Component of Federal Information Policy.
ERIC Educational Resources Information Center
Moen, William E.
1994-01-01
Discusses the need for proposing and implementing an information technology standards policy for the federal government. Topics addressed include the National Information Infrastructure (NII); voluntary standards among federal agencies; private sector organizations; coordinating the use of standards; enforcing compliance; policy goals; a framework…
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM... basis for classifying information. The policy of the Office of Science and Technology Policy is to make...
Humphreys, B L
1998-12-01
Those seeking information in health policy and public health are not as well served as those seeking clinical information. Problems inhibiting access to health policy and public health information include the heterogeneity of professionals seeking the information, the distribution of relevant information across disciplines and information sources, scarcity of synthesized information useful to practitioners, lack of awareness of available services or training in their use, and lack of access to information technology or to knowledgeable librarians and information specialists. Since 1990, the National Library of Medicine and the National Network of Libraries of Medicine have been working to enhance information services in health policy and public health through expanding the coverage of the NLM collection, building new databases, and engaging in targeted outreach and training initiatives directed toward segments of the health policy and public health communities. Progress has been made, but more remains to be done. Recommendations arising from the meeting, Accessing Useful Information: Challenges in Health Policy and Public Health, will help NLM and the National Network of Libraries of Medicine to establish priorities and action plans for the next several years.
Integrating policy-based management and SLA performance monitoring
NASA Astrophysics Data System (ADS)
Liu, Tzong-Jye; Lin, Chin-Yi; Chang, Shu-Hsin; Yen, Meng-Tzu
2001-10-01
Policy-based management system provides the configuration capability for the system administrators to focus on the requirements of customers. The service level agreement performance monitoring mechanism helps system administrators to verify the correctness of policies. However, it is difficult for a device to process the policies directly because the policies are the management concept. This paper proposes a mechanism to decompose a policy into rules that can be efficiently processed by a device. Thus, the device may process the rule and collect the performance statistics information efficiently; and the policy-based management system may collect these performance statistics information and report the service-level agreement performance monitoring information to the system administrator. The proposed policy-based management system achieves both the policy configuration and service-level agreement performance monitoring requirements. A policy consists of a condition part and an action part. The condition part is a Boolean expression of a source host IP group, a destination host IP group, etc. The action part is the parameters of services. We say that an address group is compact if it only consists of a range of IP address that can be denoted by a pair of IP address and corresponding IP mask. If the condition part of a policy only consists of the compact address group, we say that the policy is a rule. Since a device can efficiently process a compact address and a system administrator prefers to define a range of IP address, the policy-based management system has to translate policy into rules and supplements the gaps between policy and rules. The proposed policy-based management system builds the relationships between VPN and policies, policy and rules. Since the system administrator wants to monitor the system performance information of VPNs and policies, the proposed policy-based management system downloads the relationships among VPNs, policies and rules to the SNMP agents. The SNMP agents build the management information base (MIB) of all VPNs, policies and rules according to the relationships obtained from the management server. Thus, the proposed policy-based management system may get all performance monitoring information of VPNs and policies from agents. The proposed policy-based manager achieves two goals: a) provide a management environment for the system administrator to configure their network only considering the policy requirement issues and b) let the device have only to process the packet and then collect the required performance information. These two things make the proposed management system satisfy both the user and device requirements.
ERIC Educational Resources Information Center
McGowan, Veronica F.
2017-01-01
In order to explore themes of privilege in regard to policy availability, language accessibility, and underlying bias, policies related to two topics of interest to higher education campus visitors, campus firearm carry policy and smoking policy, are explored to determine how Web-based information is presented to various audiences. Implications of…
Statistical methodologies for the control of dynamic remapping
NASA Technical Reports Server (NTRS)
Saltz, J. H.; Nicol, D. M.
1986-01-01
Following an initial mapping of a problem onto a multiprocessor machine or computer network, system performance often deteriorates with time. In order to maintain high performance, it may be necessary to remap the problem. The decision to remap must take into account measurements of performance deterioration, the cost of remapping, and the estimated benefits achieved by remapping. We examine the tradeoff between the costs and the benefits of remapping two qualitatively different kinds of problems. One problem assumes that performance deteriorates gradually, the other assumes that performance deteriorates suddenly. We consider a variety of policies for governing when to remap. In order to evaluate these policies, statistical models of problem behaviors are developed. Simulation results are presented which compare simple policies with computationally expensive optimal decision policies; these results demonstrate that for each problem type, the proposed simple policies are effective and robust.
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
Boosting Population Quits Through Evidence-Based Cessation Treatment and Policy
Abrams, David B.; Graham, Amanda L.; Levy, David T.; Mabry, Patricia L.; Orleans, C. Tracy
2015-01-01
Only large increases in adult cessation will rapidly reduce population smoking prevalence. Evidence-based smoking-cessation treatments and treatment policies exist but are underutilized. More needs to be done to coordinate the widespread, efficient dissemination and implementation of effective treatments and policies. This paper is the first in a series of three to demonstrate the impact of an integrated, comprehensive systems approach to cessation treatment and policy. This paper provides an analytic framework and selected literature review that guide the two subsequent computer simulation modeling papers to show how critical leverage points may have an impact on reductions in smoking prevalence. Evidence is reviewed from the U.S. Public Health Service 2008 clinical practice guideline and other sources regarding the impact of five cessation treatment policies on quit attempts, use of evidence-based treatment, and quit rates. Cessation treatment policies would: (1) expand cessation treatment coverage and provider reimbursement; (2) mandate adequate funding for the use and promotion of evidence-based state-sponsored telephone quitlines; (3) support healthcare systems changes to prompt, guide, and incentivize tobacco treatment; (4) support and promote evidence-based treatment via the Internet; and (5) improve individually tailored, stepped-care approaches and the long-term effectiveness of evidence-based treatments. This series of papers provides an analytic framework to inform heuristic simulation models in order to take a new look at ways to markedly increase population smoking cessation by implementing a defined set of treatments and treatment-related policies with the potential to improve motivation to quit, evidence-based treatment use, and long-term effectiveness. PMID:20176308
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 1804.470-2 Section... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security policies and procedures for unclassified information and IT are prescribed in NASA Policy Directive (NPD...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 1804.470-2 Section... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security policies and procedures for unclassified information and IT are prescribed in NASA Policy Directive (NPD...
Baynam, Gareth; Bowman, Faye; Lister, Karla; Walker, Caroline E; Pachter, Nicholas; Goldblatt, Jack; Boycott, Kym M; Gahl, William A; Kosaki, Kenjiro; Adachi, Takeya; Ishii, Ken; Mahede, Trinity; McKenzie, Fiona; Townshend, Sharron; Slee, Jennie; Kiraly-Borri, Cathy; Vasudevan, Anand; Hawkins, Anne; Broley, Stephanie; Schofield, Lyn; Verhoef, Hedwig; Groza, Tudor; Zankl, Andreas; Robinson, Peter N; Haendel, Melissa; Brudno, Michael; Mattick, John S; Dinger, Marcel E; Roscioli, Tony; Cowley, Mark J; Olry, Annie; Hanauer, Marc; Alkuraya, Fowzan S; Taruscio, Domenica; Posada de la Paz, Manuel; Lochmüller, Hanns; Bushby, Kate; Thompson, Rachel; Hedley, Victoria; Lasko, Paul; Mina, Kym; Beilby, John; Tifft, Cynthia; Davis, Mark; Laing, Nigel G; Julkowska, Daria; Le Cam, Yann; Terry, Sharon F; Kaufmann, Petra; Eerola, Iiro; Norstedt, Irene; Rath, Ana; Suematsu, Makoto; Groft, Stephen C; Austin, Christopher P; Draghia-Akli, Ruxandra; Weeramanthri, Tarun S; Molster, Caron; Dawkins, Hugh J S
2017-01-01
Public health relies on technologies to produce and analyse data, as well as effectively develop and implement policies and practices. An example is the public health practice of epidemiology, which relies on computational technology to monitor the health status of populations, identify disadvantaged or at risk population groups and thereby inform health policy and priority setting. Critical to achieving health improvements for the underserved population of people living with rare diseases is early diagnosis and best care. In the rare diseases field, the vast majority of diseases are caused by destructive but previously difficult to identify protein-coding gene mutations. The reduction in cost of genetic testing and advances in the clinical use of genome sequencing, data science and imaging are converging to provide more precise understandings of the 'person-time-place' triad. That is: who is affected (people); when the disease is occurring (time); and where the disease is occurring (place). Consequently we are witnessing a paradigm shift in public health policy and practice towards 'precision public health'.Patient and stakeholder engagement has informed the need for a national public health policy framework for rare diseases. The engagement approach in different countries has produced highly comparable outcomes and objectives. Knowledge and experience sharing across the international rare diseases networks and partnerships has informed the development of the Western Australian Rare Diseases Strategic Framework 2015-2018 (RD Framework) and Australian government health briefings on the need for a National plan.The RD Framework is guiding the translation of genomic and other technologies into the Western Australian health system, leading to greater precision in diagnostic pathways and care, and is an example of how a precision public health framework can improve health outcomes for the rare diseases population.Five vignettes are used to illustrate how policy decisions provide the scaffolding for translation of new genomics knowledge, and catalyze transformative change in delivery of clinical services. The vignettes presented here are from an Australian perspective and are not intended to be comprehensive, but rather to provide insights into how a new and emerging 'precision public health' paradigm can improve the experiences of patients living with rare diseases, their caregivers and families.The conclusion is that genomic public health is informed by the individual and family needs, and the population health imperatives of an early and accurate diagnosis; which is the portal to best practice care. Knowledge sharing is critical for public health policy development and improving the lives of people living with rare diseases.
Martins, Henrique MG; Jones, Matthew R
2005-01-01
Doctors, either as a result of individual initiative or departmental policy, may use a number of different mobile computers. The relationship between device ownership/provision and usage is, however, rarely discussed. This paper therefore presents survey data (N=267) on mobile computer ownership and use by doctors in two Portuguese and two US hospitals, considering both devices owned by individuals and those supplied by the hospital. The results show that ownership is not clearly related to either usage pattern or frequency of use. Providing handheld computers also did not lead to higher number of users, higher frequency of use or significant differences in tasks carried out. Nevertheless, doctors owning handhelds alone or in combination with laptops used them more frequently than those using laptops alone. Differences in usage pattern proportions rather than demographics were a better indication of differences in usage frequencies and the tasks for which MICT devices were being used. PMID:16779089
Martins, Henrique M G; Jones, Matthew R
2005-01-01
Doctors, either as a result of individual initiative or departmental policy, may use a number of different mobile computers. The relationship between device ownership/provision and usage is, however, rarely discussed. This paper therefore presents survey data (N=267) on mobile computer ownership and use by doctors in two Portuguese and two US hospitals, considering both devices owned by individuals and those supplied by the hospital. The results show that ownership is not clearly related to either usage pattern or frequency of use. Providing handheld computers also did not lead to higher number of users, higher frequency of use or significant differences in tasks carried out. Nevertheless, doctors owning handhelds alone or in combination with laptops used them more frequently than those using laptops alone. Differences in usage pattern proportions rather than demographics were a better indication of differences in usage frequencies and the tasks for which MICT devices were being used.
Texas A & M University at Galveston: College and University Computing Environment.
ERIC Educational Resources Information Center
CAUSE/EFFECT, 1986
1986-01-01
Texas A & M University at Galveston is the only marine and maritime-oriented University in the Southwest. Its computing policy/direction, academic computing, administrative computing, and library automation are described, and hurricance emergency plans are also discussed. (MLW)
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
48 CFR 227.7200 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...
Student Perceived Importance and Correlations of Selected Computer Literacy Course Topics
ERIC Educational Resources Information Center
Ciampa, Mark
2013-01-01
Traditional college-level courses designed to teach computer literacy are in a state of flux. Today's students have high rates of access to computing technology and computer ownership, leading many policy decision makers to conclude that students already are computer literate and thus computer literacy courses are dinosaurs in a modern digital…
Barriers to integrating information technology in Saudi Arabia science education
NASA Astrophysics Data System (ADS)
Al-Alwani, Abdulkareem Eid Salamah
This study examined current level of information technology integration in science education in the Yanbu school district in Saudi Arabia, and barriers to use. Sub-domains investigated included: infrastructure and resources, policy and support, science teachers' personal beliefs, and staff development. Survey determined demographic data and level of technology implementation, personal computer use, and current instructional practice. Mean frequency of information technology use was 1--2 times during a semester. Science teachers rated barriers limiting use of technology in teaching with a scale ranging from 0 (does not limit) to 3 (greatly limits). Results found all four factors were significant barriers: infrastructure and resources (M = 2.06; p < .001), staff development (M = 2.02; p <.001), policy and support (M = 1.84; p < .041) and science teachers' personal beliefs regarding technology (M = 1.15; p < .001). Regression analysis found that locations, level of training, teaching experience, and gender predicted frequency of use (F(3,168) = 3.63, R2 = .10, p < .014). Teachers who received in-service training programs used IT significantly more frequently than those who did not receive any training (t = 2.41, p = 0.017). Teachers who received both pre-service and in-service training used IT significantly more frequently than those who did not receive any training (t = 2.61, p = 0.01). Low technology users perceived that there was no support or incentives for using technology, while high technology users did not perceive these barriers (r = -0.18, p = .01). High technology users had positive personal beliefs about how information technology benefits learning, while low technology users held negative beliefs about technology use (r = -0.20, p = .003). The more barriers science teachers experienced, the less likely they were to be information technology users (r = -0.16, p = .02). There is a need for more computers in school, more teacher training, more time for teachers to learn to use technology, and more readily-available, technical support staff. Further studies are needed to represent all science teachers in Saudi Arabia, assess technology capacity of all schools, and assess in-service staff development strategies.
Computational data sciences for assessment and prediction of climate extremes
NASA Astrophysics Data System (ADS)
Ganguly, A. R.
2011-12-01
Climate extremes may be defined inclusively as severe weather events or large shifts in global or regional weather patterns which may be caused or exacerbated by natural climate variability or climate change. This area of research arguably represents one of the largest knowledge-gaps in climate science which is relevant for informing resource managers and policy makers. While physics-based climate models are essential in view of non-stationary and nonlinear dynamical processes, their current pace of uncertainty reduction may not be adequate for urgent stakeholder needs. The structure of the models may in some cases preclude reduction of uncertainty for critical processes at scales or for the extremes of interest. On the other hand, methods based on complex networks, extreme value statistics, machine learning, and space-time data mining, have demonstrated significant promise to improve scientific understanding and generate enhanced predictions. When combined with conceptual process understanding at multiple spatiotemporal scales and designed to handle massive data, interdisciplinary data science methods and algorithms may complement or supplement physics-based models. Specific examples from the prior literature and our ongoing work suggests how data-guided improvements may be possible, for example, in the context of ocean meteorology, climate oscillators, teleconnections, and atmospheric process understanding, which in turn can improve projections of regional climate, precipitation extremes and tropical cyclones in an useful and interpretable fashion. A community-wide effort is motivated to develop and adapt computational data science tools for translating climate model simulations to information relevant for adaptation and policy, as well as for improving our scientific understanding of climate extremes from both observed and model-simulated data.
The Uses of Big Data in Cities.
Bettencourt, Luís M A
2014-03-01
There is much enthusiasm currently about the possibilities created by new and more extensive sources of data to better understand and manage cities. Here, I explore how big data can be useful in urban planning by formalizing the planning process as a general computational problem. I show that, under general conditions, new sources of data coordinated with urban policy can be applied following fundamental principles of engineering to achieve new solutions to important age-old urban problems. I also show that comprehensive urban planning is computationally intractable (i.e., practically impossible) in large cities, regardless of the amounts of data available. This dilemma between the need for planning and coordination and its impossibility in detail is resolved by the recognition that cities are first and foremost self-organizing social networks embedded in space and enabled by urban infrastructure and services. As such, the primary role of big data in cities is to facilitate information flows and mechanisms of learning and coordination by heterogeneous individuals. However, processes of self-organization in cities, as well as of service improvement and expansion, must rely on general principles that enforce necessary conditions for cities to operate and evolve. Such ideas are the core of a developing scientific theory of cities, which is itself enabled by the growing availability of quantitative data on thousands of cities worldwide, across different geographies and levels of development. These three uses of data and information technologies in cities constitute then the necessary pillars for more successful urban policy and management that encourages, and does not stifle, the fundamental role of cities as engines of development and innovation in human societies.
Laitila, Jussi; Moilanen, Atte; Pouzols, Federico M
2014-01-01
Biodiversity offsetting, which means compensation for ecological and environmental damage caused by development activity, has recently been gaining strong political support around the world. One common criticism levelled at offsets is that they exchange certain and almost immediate losses for uncertain future gains. In the case of restoration offsets, gains may be realized after a time delay of decades, and with considerable uncertainty. Here we focus on offset multipliers, which are ratios between damaged and compensated amounts (areas) of biodiversity. Multipliers have the attraction of being an easily understandable way of deciding the amount of offsetting needed. On the other hand, exact values of multipliers are very difficult to compute in practice if at all possible. We introduce a mathematical method for deriving minimum levels for offset multipliers under the assumption that offsetting gains must compensate for the losses (no net loss offsetting). We calculate absolute minimum multipliers that arise from time discounting and delayed emergence of offsetting gains for a one-dimensional measure of biodiversity. Despite the highly simplified model, we show that even the absolute minimum multipliers may easily be quite large, in the order of dozens, and theoretically arbitrarily large, contradicting the relatively low multipliers found in literature and in practice. While our results inform policy makers about realistic minimal offsetting requirements, they also challenge many current policies and show the importance of rigorous models for computing (minimum) offset multipliers. The strength of the presented method is that it requires minimal underlying information. We include a supplementary spreadsheet tool for calculating multipliers to facilitate application. PMID:25821578
New Trends in Specialised Information Policy within the Federal Republic of Germany.
ERIC Educational Resources Information Center
Czermak, M. J.
1986-01-01
Reviews European attitudes toward information policy developments in West Germany, and describes recent activities undertaken by the German private sector, plans to reorganize the Society for Information and Documentation, and the federal government's specialized information program. The policies, structure, and activities of the Scientific and…
Uncertainty in sample estimates and the implicit loss function for soil information.
NASA Astrophysics Data System (ADS)
Lark, Murray
2015-04-01
One significant challenge in the communication of uncertain information is how to enable the sponsors of sampling exercises to make a rational choice of sample size. One way to do this is to compute the value of additional information given the loss function for errors. The loss function expresses the costs that result from decisions made using erroneous information. In certain circumstances, such as remediation of contaminated land prior to development, loss functions can be computed and used to guide rational decision making on the amount of resource to spend on sampling to collect soil information. In many circumstances the loss function cannot be obtained prior to decision making. This may be the case when multiple decisions may be based on the soil information and the costs of errors are hard to predict. The implicit loss function is proposed as a tool to aid decision making in these circumstances. Conditional on a logistical model which expresses costs of soil sampling as a function of effort, and statistical information from which the error of estimates can be modelled as a function of effort, the implicit loss function is the loss function which makes a particular decision on effort rational. In this presentation the loss function is defined and computed for a number of arbitrary decisions on sampling effort for a hypothetical soil monitoring problem. This is based on a logistical model of sampling cost parameterized from a recent geochemical survey of soil in Donegal, Ireland and on statistical parameters estimated with the aid of a process model for change in soil organic carbon. It is shown how the implicit loss function might provide a basis for reflection on a particular choice of sample size by comparing it with the values attributed to soil properties and functions. Scope for further research to develop and apply the implicit loss function to help decision making by policy makers and regulators is then discussed.
Framework for Informed Policy Making Using Data from National Environmental Observatories
NASA Astrophysics Data System (ADS)
Wee, B.; Taylor, J. R.; Poinsatte, J.
2012-12-01
Large-scale environmental changes pose challenges that straddle environmental, economic, and social boundaries. As we design and implement climate adaptation strategies at the Federal, state, local, and tribal levels, accessible and usable data are essential for implementing actions that are informed by the best available information. Data-intensive science has been heralded as an enabler for scientific breakthroughs powered by advanced computing capabilities and interoperable data systems. Those same capabilities can be applied to data and information systems that facilitate the transformation of data into highly processed products. At the interface of scientifically informed public policy and data intensive science lies the potential for producers of credible, integrated, multi-scalar environmental data like the National Ecological Observatory Network (NEON) and its partners to capitalize on data and informatics interoperability initiatives that enable the integration of environmental data from across credible data sources. NSF's large-scale environmental observatories such as NEON and the Ocean Observatories Initiative (OOI) are designed to provide high-quality, long-term environmental data for research. These data are also meant to be repurposed for operational needs that like risk management, vulnerability assessments, resource management, and others. The proposed USDA Agriculture Research Service (ARS) Long Term Agro-ecosystem Research (LTAR) network is another example of such an environmental observatory that will produce credible data for environmental / agricultural forecasting and informing policy. To facilitate data fusion across observatories, there is a growing call for observation systems to more closely coordinate and standardize how variables are measured. Together with observation standards, cyberinfrastructure standards enable the proliferation of an ecosystem of applications that utilize diverse, high-quality, credible data. Interoperability facilitates the integration of data from multiple credible sources of data, and enables the repurposing of data for use at different geographical scales. Metadata that captures the transformation of data into value-added products ("provenance") lends reproducability and transparency to the entire process. This way, the datasets and model code used to create any product can be examined by other parties. This talk outlines a pathway for transforming environmental data into value-added products by various stakeholders to better inform sustainable agriculture using data from environmental observatories including NEON and LTAR.;
Cameron, Roy; Manske, Stephen; Brown, K. Stephen; Jolin, Mari Alice; Murnaghan, Donna; Lovato, Chris
2007-01-01
The Canadian Cancer Society and the National Cancer Institute of Canada have charged their Centre for Behavioral Research and Program Evaluation with contributing to the development of the country’s systemic capacity to link research, policy, and practice related to population-level interventions. Local data collection and feedback systems are integral to this capacity. Canada’s School Health Action Planning and Evaluation System (SHAPES) allows data to be collected from all of a school’s students, and these data are used to produce computer-generated school “health profiles.” SHAPES is being used for intervention planning, evaluation, surveillance, and research across Canada. Strong demand and multipartner investment suggest that SHAPES is adding value in all of these domains. Such systems can contribute substantially to evidence-informed public health practice, public engagement, participatory action research, and relevant, timely population intervention research. PMID:17329662
Jeffrey D. Kline
2000-01-01
In a recent volume of this journal, Nelson (Land Use Policy 16 (1999) 121) defines and computes several statewide indicators designed to evaluate the effectiveness of growth management efforts in Oregon and Florida. Two indicators are intended to measure how well states have contained urban sprawl and preserved farmland. They are computed using US Census of Population...
ERIC Educational Resources Information Center
White, Deborah; Rampy, Leah
The Agency for Instructional Television (AIT) has established a consortium of 42 state, provincial, and local educational agencies to develop computer/video materials in problem-solving, prepare inservice materials, and define and conduct policy studies. The purpose of this study, which focuses on the last task, was two-fold: (1) to identify…
Tam, Jamie; Levy, David T; Jeon, Jihyoun; Clarke, John; Gilkeson, Scott; Hall, Tim; Feuer, Eric J; Holford, Theodore R; Meza, Rafael
2018-03-23
Smoking remains the leading cause of preventable death in the USA but can be reduced through policy interventions. Computational models of smoking can provide estimates of the projected impact of tobacco control policies and can be used to inform public health decision making. We outline a protocol for simulating the effects of tobacco policies on population health outcomes. We extend the Smoking History Generator (SHG), a microsimulation model based on data from the National Health Interview Surveys, to evaluate the effects of tobacco control policies on projections of smoking prevalence and mortality in the USA. The SHG simulates individual life trajectories including smoking initiation, cessation and mortality. We illustrate the application of the SHG policy module for four types of tobacco control policies at the national and state levels: smoke-free air laws, cigarette taxes, increasing tobacco control programme expenditures and raising the minimum age of legal access to tobacco. Smoking initiation and cessation rates are modified by age, birth cohort, gender and years since policy implementation. Initiation and cessation rate modifiers are adjusted for differences across age groups and the level of existing policy coverage. Smoking prevalence, the number of population deaths avoided, and life-years gained are calculated for each policy scenario at the national and state levels. The model only considers direct individual benefits through reduced smoking and does not consider benefits through reduced exposure to secondhand smoke. A web-based interface is being developed to integrate the results of the simulations into a format that allows the user to explore the projected effects of tobacco control policies in the USA. Usability testing is being conducted in which experts provide feedback on the interface. Development of this tool is under way, and a publicly accessible website is available at http://www.tobaccopolicyeffects.org. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Levy, David T; Jeon, Jihyoun; Clarke, John; Gilkeson, Scott; Hall, Tim; Holford, Theodore R; Meza, Rafael
2018-01-01
Introduction Smoking remains the leading cause of preventable death in the USA but can be reduced through policy interventions. Computational models of smoking can provide estimates of the projected impact of tobacco control policies and can be used to inform public health decision making. We outline a protocol for simulating the effects of tobacco policies on population health outcomes. Methods and analysis We extend the Smoking History Generator (SHG), a microsimulation model based on data from the National Health Interview Surveys, to evaluate the effects of tobacco control policies on projections of smoking prevalence and mortality in the USA. The SHG simulates individual life trajectories including smoking initiation, cessation and mortality. We illustrate the application of the SHG policy module for four types of tobacco control policies at the national and state levels: smoke-free air laws, cigarette taxes, increasing tobacco control programme expenditures and raising the minimum age of legal access to tobacco. Smoking initiation and cessation rates are modified by age, birth cohort, gender and years since policy implementation. Initiation and cessation rate modifiers are adjusted for differences across age groups and the level of existing policy coverage. Smoking prevalence, the number of population deaths avoided, and life-years gained are calculated for each policy scenario at the national and state levels. The model only considers direct individual benefits through reduced smoking and does not consider benefits through reduced exposure to secondhand smoke. Ethics and dissemination A web-based interface is being developed to integrate the results of the simulations into a format that allows the user to explore the projected effects of tobacco control policies in the USA. Usability testing is being conducted in which experts provide feedback on the interface. Development of this tool is under way, and a publicly accessible website is available at http://www.tobaccopolicyeffects.org. PMID:29574440
People and Policy Strategies | Climate Neutral Research Campuses | NREL
People and Policy Strategies People and Policy Strategies Strategies that impact human behavior and Work Strategies Land Use Space Management Space Planning and Use Energy conservation policies encourage building occupants to turn off lights and computers, close fume hoods, limit appliance use in offices, and
NORMATIVE SCIENCE: A CORRUPTING INFLUENCE IN ECOLOGICAL AND NATURAL RESOURCE POLICY
Effectively resolving the typical ecological or natural resource policy issue requires providing an array of scientific information to decision-makers. The ability of scientists (and scientific information) to constructively inform ecological policy deliberations has been dimi...
Code of Federal Regulations, 2012 CFR
2012-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2010 CFR
2010-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2011 CFR
2011-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2014 CFR
2014-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2013 CFR
2013-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
NORMATIVE SCIENCE: SUBVERTING DEVELOPMENT OF SOUND FISHERIES POLICY
Effectively resolving the typical fisheries policy issue requires an array of scientific information as part of the input provided to decision-makers. In my experience, the ability of scientists (and scientific information) to constructively inform fisheries policy deliberations...
Foreign Policy Choices for Americans: A Nonpartisan Guide for Voters.
ERIC Educational Resources Information Center
Hoepli, Nancy L., Ed.; And Others
Eighteen foreign policy topics are presented in this book to provide voters, officeholders, candidates, students, and teachers with background information, facts, and U.S. foreign policies. A fact list, historical background information, current administration policy, and policy alternatives are described for most of these topics. Part 1 discusses…
Laboratory Computing Resource Center
Systems Computing and Data Resources Purchasing Resources Future Plans For Users Getting Started Using LCRC Software Best Practices and Policies Getting Help Support Laboratory Computing Resource Center Laboratory Computing Resource Center Latest Announcements See All April 27, 2018, Announcements, John Low
A conceptual framework and principles for trusted pervasive health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli
2012-04-06
Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.
Research Issues in Information and Public Policy. Occasional Paper 2.
ERIC Educational Resources Information Center
Galvin, Thomas J.
This paper addresses the very timely issue of national information policy, particularly in view of the pending second White House Conference on Libraries and Information Services in July 1991. Information policy is examined from economic, political, and social points of view and the national government is urged to address the challenging task of…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-26
... Coordinator for Health Information Technology, HHS. ACTION: Notice of meeting. This notice announces a... Information Technology (ONC). The meeting will be open to the public. Name of Committee: HIT Policy Committee... a policy framework for the development and adoption of a nationwide health information technology...
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION FREEDOM OF INFORMATION REGULATIONS Basic Policy... recognize the right of public access to information in the possession of the Department, but also protect... and confidential commercial information, prohibited from release by law. This policy calls for the...
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION FREEDOM OF INFORMATION REGULATIONS Basic Policy... recognize the right of public access to information in the possession of the Department, but also protect... and confidential commercial information, prohibited from release by law. This policy calls for the...
Code of Federal Regulations, 2014 CFR
2014-10-01
... of Health and Human Services GENERAL ADMINISTRATION FREEDOM OF INFORMATION REGULATIONS Basic Policy... recognize the right of public access to information in the possession of the Department, but also protect... and confidential commercial information, prohibited from release by law. This policy calls for the...
Information Access Policy & Compliance Branch
Information Access Policy & Compliance Branch Join the Air Force Home Offices By Command By Base Library Handbook Annual Reports Resources Privacy Act Search Information Access Policy & Compliance BranchECOLOGICAL POLICY: DEFINING APPROPRIATE ROLES FOR SCIENCE AND SCIENTISTS - 2007
Resolving typical ecological policy issues requires an array of scientific information as part of the input provided to decision-makers. The ability of scientists (and scientific information) to constructively inform policy deliberations diminishes when what is offered as "scienc...
78 FR 42945 - Health Information Technology Policy Committee Vacancy
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Vacancy AGENCY: Government Accountability Office (GAO). ACTION: Notice on letters of nomination to fill vacancy. SUMMARY: The American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy...
78 FR 7784 - Health Information Technology Policy Committee Nomination Letters
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Nomination Letters AGENCY: Government Accountability Office (GAO). ACTION: Notice on letters of nomination of candidates... Technology Policy Committee (Health IT Policy Committee) and gave the Comptroller General responsibility for...
1999-05-14
The Food and Drug Administration (FDA) is announcing the availability of a new compliance policy guide (CPG) entitled "Year 2000 (Y2K) Computer Compliance" (section 160-800). This guidance document represents the agency's current thinking on the manufacturing and distribution of domestic and imported products regulated by FDA using computer systems that may not perform properly before, or during, the transition to the year 2000 (Y2K). The text of the CPG is included in this notice. This compliance guidance document is an update to the Compliance Policy Guides Manual (August 1996 edition). It is a new CPG, and it will be included in the next printing of the Compliance Policy Guides Manual. This CPG is intended for FDA personnel, and it is available electronically to the public.
Code of Federal Regulations, 2010 CFR
2010-10-01
... computer data, or in any other form, and other supporting evidence to satisfy contract negotiation... described in paragraph (a) of this section is maintained on a computer, contractors shall retain the computer data on a reliable medium for the time periods prescribed. Contractors may transfer computer data...
Code of Federal Regulations, 2012 CFR
2012-10-01
... computer data, or in any other form, and other supporting evidence to satisfy contract negotiation... described in paragraph (a) of this section is maintained on a computer, contractors shall retain the computer data on a reliable medium for the time periods prescribed. Contractors may transfer computer data...
Code of Federal Regulations, 2014 CFR
2014-10-01
... computer data, or in any other form, and other supporting evidence to satisfy contract negotiation... described in paragraph (a) of this section is maintained on a computer, contractors shall retain the computer data on a reliable medium for the time periods prescribed. Contractors may transfer computer data...
Code of Federal Regulations, 2011 CFR
2011-10-01
... computer data, or in any other form, and other supporting evidence to satisfy contract negotiation... described in paragraph (a) of this section is maintained on a computer, contractors shall retain the computer data on a reliable medium for the time periods prescribed. Contractors may transfer computer data...
Code of Federal Regulations, 2013 CFR
2013-10-01
... computer data, or in any other form, and other supporting evidence to satisfy contract negotiation... described in paragraph (a) of this section is maintained on a computer, contractors shall retain the computer data on a reliable medium for the time periods prescribed. Contractors may transfer computer data...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... DEPARTMENT OF STATE [Public Notice 6602] Advisory Committee on International Communications and... Advisory Committee on International Communications and Information Policy (ACICIP) for an additional two... issues and concerns affecting international communications and information policy. ACICIP members are...
32 CFR 2700.11 - Basic policy.
Code of Federal Regulations, 2011 CFR
2011-07-01
... government information with the need to protect certain national security information from disclosure, these... Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.11 Basic policy. (a) General. It is the policy of OMSN...
NASA Technical Reports Server (NTRS)
Bishop, Ann P.; Pinelli, Thomas E.
1995-01-01
This research used survey research to explore and describe the use of computer networks by aerospace engineers. The study population included 2000 randomly selected U.S. aerospace engineers and scientists who subscribed to Aerospace Engineering. A total of 950 usable questionnaires were received by the cutoff date of July 1994. Study results contribute to existing knowledge about both computer network use and the nature of engineering work and communication. We found that 74 percent of mail survey respondents personally used computer networks. Electronic mail, file transfer, and remote login were the most widely used applications. Networks were used less often than face-to-face interactions in performing work tasks, but about equally with reading and telephone conversations, and more often than mail or fax. Network use was associated with a range of technical, organizational, and personal factors: lack of compatibility across systems, cost, inadequate access and training, and unwillingness to embrace new technologies and modes of work appear to discourage network use. The greatest positive impacts from networking appear to be increases in the amount of accurate and timely information available, better exchange of ideas across organizational boundaries, and enhanced work flexibility, efficiency, and quality. Involvement with classified or proprietary data and type of organizational structure did not distinguish network users from nonusers. The findings can be used by people involved in the design and implementation of networks in engineering communities to inform the development of more effective networking systems, services, and policies.
POLICY AND SCIENCE IN NATURAL RESOURCE AGENCIES: SEARCHING FOR APPROPRIATE ROLES
Effectively resolving natural resource, ecological, and environmental policy problems often requires substantial input from scientists. The value of scientific information for informing policy deliberations is reduced when what is offered as "science" is inculcated with policy p...
ERIC Educational Resources Information Center
Association for Education in Journalism and Mass Communication.
The Communication Technology and Policy section of the proceedings contains the following eight papers: "Effects of Home Computer Use on Adolescents' Family Lives: Time Use and Relationships with Family Members in Taiwan and America" (Mine-Ping Sun); "Computers, Ambivalence and the Transformation of Journalistic Work" (John T.…
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology.
Based upon the premise that manufacturing, communications, and computers are the key to productivity, this hearing before the Technology Policy Task Force was held to examine how the federal government interacts with universities, engineering research centers, professional associations, and private businesses in these areas. This document contains…
ERIC Educational Resources Information Center
Myers, Charles A.
The report highlights policy implications of research conducted on formal and informal labor market information systems and the disadvantaged. Policy implications are developed at the end of each of eight sections reviewing studies in the areas of: insurance, an inner-city training program, newspaper ads, the Job Bank system, immigrant labor,…
Applying analytic hierarchy process to assess healthcare-oriented cloud computing service systems.
Liao, Wen-Hwa; Qiu, Wan-Li
2016-01-01
Numerous differences exist between the healthcare industry and other industries. Difficulties in the business operation of the healthcare industry have continually increased because of the volatility and importance of health care, changes to and requirements of health insurance policies, and the statuses of healthcare providers, which are typically considered not-for-profit organizations. Moreover, because of the financial risks associated with constant changes in healthcare payment methods and constantly evolving information technology, healthcare organizations must continually adjust their business operation objectives; therefore, cloud computing presents both a challenge and an opportunity. As a response to aging populations and the prevalence of the Internet in fast-paced contemporary societies, cloud computing can be used to facilitate the task of balancing the quality and costs of health care. To evaluate cloud computing service systems for use in health care, providing decision makers with a comprehensive assessment method for prioritizing decision-making factors is highly beneficial. Hence, this study applied the analytic hierarchy process, compared items related to cloud computing and health care, executed a questionnaire survey, and then classified the critical factors influencing healthcare cloud computing service systems on the basis of statistical analyses of the questionnaire results. The results indicate that the primary factor affecting the design or implementation of optimal cloud computing healthcare service systems is cost effectiveness, with the secondary factors being practical considerations such as software design and system architecture.
Where next for the reproducibility agenda in computational biology?
Lewis, Joanna; Breeze, Charles E; Charlesworth, Jane; Maclaren, Oliver J; Cooper, Jonathan
2016-07-15
The concept of reproducibility is a foundation of the scientific method. With the arrival of fast and powerful computers over the last few decades, there has been an explosion of results based on complex computational analyses and simulations. The reproducibility of these results has been addressed mainly in terms of exact replicability or numerical equivalence, ignoring the wider issue of the reproducibility of conclusions through equivalent, extended or alternative methods. We use case studies from our own research experience to illustrate how concepts of reproducibility might be applied in computational biology. Several fields have developed 'minimum information' checklists to support the full reporting of computational simulations, analyses and results, and standardised data formats and model description languages can facilitate the use of multiple systems to address the same research question. We note the importance of defining the key features of a result to be reproduced, and the expected agreement between original and subsequent results. Dynamic, updatable tools for publishing methods and results are becoming increasingly common, but sometimes come at the cost of clear communication. In general, the reproducibility of computational research is improving but would benefit from additional resources and incentives. We conclude with a series of linked recommendations for improving reproducibility in computational biology through communication, policy, education and research practice. More reproducible research will lead to higher quality conclusions, deeper understanding and more valuable knowledge.
Data Transparency in Privately Funded Scientific Research
NASA Astrophysics Data System (ADS)
Brewer, P. G.
2016-12-01
Research investigations funded by the Gulf of Mexico Research Initiative (GoMRI) have resulted in a large pulse of scientific data produced by studies ranging across the research goals of the program. These studies have produced datasets from laboratory, field, and modeling activities describing phenomenon ranging from microscopic fluid dynamics to large-scale ocean currents, bacteria to marine mammals, and detailed field observations to synoptic mapping. One of GoMRI's central tenets is to ensure that all data are preserved and made publicly available. Thus, GoMRI formed the Gulf of Mexico Research Initiative Data and Information Cooperative (GRIIDC) with the mission to ensure a data and information legacy that promotes continual scientific discovery and public awareness of the Gulf of Mexico ecosystem. The GoMRI Research Board commitment to open data is exemplified in GoMRI's data program policies and management. The Research Board established a policy that research data must be publically available as soon as possible and no later than one year following collection or at the time of publication. GRIIDC's data specialists, and computer system experts along with a team of researchers funded by GOMRI and GoMRI Research Board members developed a data management system and process for storing and distributing all of the scientific data generated by the GoMRI researchers. Researcher compliance with the data policy is a requirement for annual funding increments, No Cost Extensions, and eligibility for future funding. Since data compliance is an important element of grant performance compliance with GOMRI data policies data are actively tracked and reported to the Board. This initiative comprises an essential component of GoMRI's research independence and legacy.
Evaluation of spatial accessibility to primary healthcare using GIS
NASA Astrophysics Data System (ADS)
Jamtsho, S.; Corner, R. J.
2014-11-01
Primary health care is considered to be one of the most important aspects of the health care system in any country, which directly helps in improving the health of the population. Potential spatial accessibility is a very important component of the primary health care system. One technique for studying spatial accessibility is by computing a gravity-based measure within a geographic information system (GIS) framework. In this study, straight-line distances between the associated population clusters and the health facilities and the provider-to-population ratio were used to compute the spatial accessibility of the population clusters for the whole country. Bhutan has been chosen as the case study area because it is quite easy to acquire and process data for the whole country due to its small size and population. The spatial accessibility measure of the 203 sub-districts shows noticeable disparities in health care accessibility in this country with about only 19 sub-districts achieving good health accessibility ranking. This study also examines a number of different health accessibility policy scenarios which can assist in identifying the most effective health policy from amongst many probable planning scenarios. Such a health accessibility measuring system can be incorporated into an existing spatial health system in developing countries to facilitate the proper planning and equitable distribution of health resources.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang, Shangping; Ye, Jian; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
Wang, Shangping; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption. PMID:29795577
Efficient Evaluation Functions for Multi-Rover Systems
NASA Technical Reports Server (NTRS)
Agogino, Adrian; Tumer, Kagan
2004-01-01
Evolutionary computation can be a powerful tool in cresting a control policy for a single agent receiving local continuous input. This paper extends single-agent evolutionary computation to multi-agent systems, where a collection of agents strives to maximize a global fitness evaluation function that rates the performance of the entire system. This problem is solved in a distributed manner, where each agent evolves its own population of neural networks that are used as the control policies for the agent. Each agent evolves its population using its own agent-specific fitness evaluation function. We propose to create these agent-specific evaluation functions using the theory of collectives to avoid the coordination problem where each agent evolves a population that maximizes its own fitness function, yet the system has a whole achieves low values of the global fitness function. Instead we will ensure that each fitness evaluation function is both "aligned" with the global evaluation function and is "learnable," i.e., the agents can readily see how their behavior affects their evaluation function. We then show how these agent-specific evaluation functions outperform global evaluation methods by up to 600% in a domain where a set of rovers attempt to maximize the amount of information observed while navigating through a simulated environment.
U.S. Telecommunications and Trade Policies: The Need for an Effective Information Age Model.
ERIC Educational Resources Information Center
Tirman, W. Robert
This paper examines the need for telecommunications and international trade policies in the Information Age and presents a model for developing such policies. The first of seven sections discusses the need for an Information Age Model, and the technological changes that are giving rise to increasingly integrated Information Age networks are…
ERIC Educational Resources Information Center
CAUSE, Boulder, CO.
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Franczak, Michael J; Klein, Madeline; Raslau, Flavius; Bergholte, Jo; Mark, Leighton P; Ulmer, John L
2014-05-01
The adoption of electronic health records (EHRs) that meet federal meaningful-use standards is a major US national policy priority. Policy makers recognize the potential of electronic communication in delivering high-quality health care, particularly in an environment of expanding remote access to medical care and the ever-increasing need to transmit health care records across institutions. To demonstrate this principle, we sought to estimate the significance of EHR access in emergent neuroradiologic interpretations. Three neuroradiologists conducted a prospective expert-rater analysis of 2,000 consecutive head computed tomography (CT) exams ordered by emergency department (ED) physicians. For each head CT exam, the neuroradiologists compared medical information generated by ED physicians to information generated by the interpreting radiologists who had access to additional EHR-derived patient data. In 6.1 percent of the head CT exams, the neuroradiologists reached consensus--meaning two out of three agreed--that the additional clinical data derived from the EHR was "very likely" to influence radiological interpretations and that the lack of that data would have adversely affected medical management in those patients. Health care providers must recognize the value of implementing EHRs and foster their widespread adoption.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-25
... DEPARTMENT OF STATE [Public Notice 7813] Advisory Committee on International Communications and... Committee on International Communications and Information Policy (ACICIP) for a period of two years. The... affecting international communications and information policy. ACICIP members are private sector...
DOT National Transportation Integrated Search
2014-10-01
This report documents policy considerations for Enabling Advanced Traveler Information Services, or EnableATIS. EnableATIS is the traveler information element of the Dynamic Mobility Applications program, and it provides a framework to develop multi-...
32 CFR 292.4 - Specific policy.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF INFORMATION ACT § 292.4 Specific policy... within the definition of the word “record:” (1) Objects or articles, such as structures, furniture... created or used as sources of information about organizations, policies, functions, decisions, or...
32 CFR 292.4 - Specific policy.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF INFORMATION ACT § 292.4 Specific policy... within the definition of the word “record:” (1) Objects or articles, such as structures, furniture... created or used as sources of information about organizations, policies, functions, decisions, or...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
Code of Federal Regulations, 2010 CFR
2010-10-01
... PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 724.202 Policy. The U.S. Agency for International Development's policies concerning implementation of the Freedom of...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 9 2011-10-01 2011-10-01 false Policy. 540.1 Section 540.1 Wildlife and Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.1 Policy. It is the policy of the Marine... security information. [44 FR 55381, Sept. 26, 1979] ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Policy. 540.1 Section 540.1 Wildlife and Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.1 Policy. It is the policy of the Marine... security information. [44 FR 55381, Sept. 26, 1979] ...
Damani, Zaheed; MacKean, Gail; Bohm, Eric; DeMone, Brie; Wright, Brock; Noseworthy, Tom; Holroyd-Leduc, Jayna; Marshall, Deborah A
2016-10-18
Policy dialogues are critical for developing responsive, effective, sustainable, evidence-informed policy. Our multidisciplinary team, including researchers, physicians and senior decision-makers, comprehensively evaluated The Winnipeg Central Intake Service, a single-entry model in Winnipeg, Manitoba, to improve patient access to hip/knee replacement surgery. We used the evaluation findings to develop five evidence-informed policy directions to help improve access to scheduled clinical services across Manitoba. Using guiding principles of public participation processes, we hosted a policy roundtable meeting to engage stakeholders and use their input to refine the policy directions. Here, we report on the use and input of a policy roundtable meeting and its role in contributing to the development of evidence-informed policy. Our evidence-informed policy directions focused on formal measurement/monitoring of quality, central intake as a preferred model for service delivery, provincial scope, transparent processes/performance indicators, and patient choice of provider. We held a policy roundtable meeting and used outcomes of facilitated discussions to refine these directions. Individuals from our team and six stakeholder groups across Manitoba participated (n = 44), including patients, family physicians, orthopaedic surgeons, surgical office assistants, Winnipeg Central Intake team, and administrators/managers. We developed evaluation forms to assess the meeting process, and collected decision-maker partners' perspectives on the value of the policy roundtable meeting and use of policy directions to improve access to scheduled clinical services after the meeting, and again 15 months later. We analyzed roundtable and evaluation data using thematic analysis to identify key themes. Four key findings emerged. First, participants supported all policy directions, with revisions and key implementation considerations identified. Second, participants felt the policy roundtable meeting achieved its purpose (to engage stakeholders, elicit feedback, refine policy directions). Third, our decision-maker partners' expectations of the policy roundtable meeting were exceeded; they re-affirmed its value and described the refined policy directions as foundational to establishing the vocabulary, vision and framework for improving access to scheduled clinical services in Manitoba. Finally, our adaptation of key design elements was conducive to discussion of issues surrounding access to care. Our policy roundtable process was an effective tool for acquiring broad input from stakeholders, refining policy directions and forming the necessary consensus starting points to move towards evidence-informed policy.
2009-01-01
This article is part of a series written for people responsible for making decisions about health policies and programmes and for those who support these decision makers. In this article, we address strategies to inform and engage the public in policy development and implementation. The importance of engaging the public (both patients and citizens) at all levels of health systems is widely recognised. They are the ultimate recipients of the desirable and undesirable impacts of public policies, and many governments and organisations have acknowledged the value of engaging them in evidence-informed policy development. The potential benefits of doing this include the establishment of policies that include their ideas and address their concerns, the improved implementation of policies, improved health services, and better health. Public engagement can also be viewed as a goal in itself by encouraging participative democracy, public accountability and transparency. We suggest three questions that can be considered with regard to public participation strategies. These are: 1. What strategies can be used when working with the mass media to inform the public about policy development and implementation? 2. What strategies can be used when working with civil society groups to inform and engage them in policy development and implementation? 3. What methods can be used to involve consumers in policy development and implementation? PMID:20018105
Medical Representatives' Intention to Use Information Technology in Pharmaceutical Marketing.
Kwak, Eun-Seon; Chang, Hyejung
2016-10-01
Electronic detailing (e-detailing), the use of electronic devices to facilitate sales presentations to physicians, has been adopted and expanded in the pharmaceutical industry. To maximize the potential outcome of e-detailing, it is important to understand medical representatives (MRs)' behavior and attitude to e-detailing. This study investigates how information technology devices such as laptop computers and tablet PCs are utilized in pharmaceutical marketing, and it analyzes the factors influencing MRs' intention to use devices. This study has adopted and modified the theory of Roger's diffusion of innovation model and the technology acceptance model. To test the model empirically, a questionnaire survey was conducted with 221 MRs who were working in three multinational or eleven domestic pharmaceutical companies in Korea. Overall, 28% and 35% of MRs experienced using laptop computers and tablet PCs in pharmaceutical marketing, respectively. However, the rates were different across different groups of MRs, categorized by age, education level, position, and career. The results showed that MRs' intention to use information technology devices was significantly influenced by perceived usefulness in general. Perceived ease of use, organizational and individual innovativeness, and several MR characteristics were also found to have significant impacts. This study provides timely information about e-detailing devices to marketing managers and policy makers in the pharmaceutical industry for successful marketing strategy development by understanding the needs of MRs' intention to use information technology. Further in-depth study should be conducted to understand obstacles and limitations and to improve the strategies for better marketing tools.
ERIC Educational Resources Information Center
Price, Douglas
This booklet summarizes the proceedings of a forum--whose audience consisted of over 200 library and information managers, congressional staff members, and persons from the information industry and academic community--on the condition of federal information policies as they relate to the Congressional initiative. Among issues discussed are: (1)…
Big Data, Smart Homes and Ambient Assisted Living
Wass, S.
2014-01-01
Summary Objectives To discuss how current research in the area of smart homes and ambient assisted living will be influenced by the use of big data. Methods A scoping review of literature published in scientific journals and conference proceedings was performed, focusing on smart homes, ambient assisted living and big data over the years 2011-2014. Results The health and social care market has lagged behind other markets when it comes to the introduction of innovative IT solutions and the market faces a number of challenges as the use of big data will increase. First, there is a need for a sustainable and trustful information chain where the needed information can be transferred from all producers to all consumers in a structured way. Second, there is a need for big data strategies and policies to manage the new situation where information is handled and transferred independently of the place of the expertise. Finally, there is a possibility to develop new and innovative business models for a market that supports cloud computing, social media, crowdsourcing etc. Conclusions The interdisciplinary area of big data, smart homes and ambient assisted living is no longer only of interest for IT developers, it is also of interest for decision makers as customers make more informed choices among today’s services. In the future it will be of importance to make information usable for managers and improve decision making, tailor smart home services based on big data, develop new business models, increase competition and identify policies to ensure privacy, security and liability. PMID:25123734
Perceptions on the Role of Evidence: An English Alcohol Policy Case Study
ERIC Educational Resources Information Center
Toner, Paul; Lloyd, Charlie; Thom, Betsy; MacGregor, Susanne; Godfrey, Christine; Herring, Rachel; Tchilingirian, Jordan
2014-01-01
This paper explores the competing influences which inform public health policy and describes the role that research evidence plays within the policy-making process. In particular it draws on a recent English alcohol policy case study to assess the role of evidence in informing policy and practice. Semi-structured interviews with key national,…
ERIC Educational Resources Information Center
Kettunen, Jaana; Vuorinen, Raimo; Ruusuvirta, Outi
2016-01-01
This article reports findings from a phenomenographic investigation into European Lifelong Guidance Policy Network representatives' conceptions of the role of information and communication technologies (ICT) related to national lifelong guidance policies. The role of ICT in relation to national lifelong guidance policies was conceived as (1)…
Health care information infrastructure: what will it be and how will we get there?
NASA Astrophysics Data System (ADS)
Kun, Luis G.
1996-02-01
During the first Health Care Technology Policy [HCTPI conference last year, during Health Care Reform, four major issues were brought up in regards to the underway efforts to develop a Computer Based Patient Record (CBPR)I the National Information Infrastructure (NIl) as part of the High Performance Computers & Communications (HPCC), and the so-called "Patient Card" . More specifically it was explained how a national information system will greatly affect the way health care delivery is provided to the United States public and reduce its costs. These four issues were: Constructing a National Information Infrastructure (NIl); Building a Computer Based Patient Record System; Bringing the collective resources of our National Laboratories to bear in developing and implementing the NIl and CBPR, as well as a security system with which to safeguard the privacy rights of patients and the physician-patient privilege; Utilizing Government (e.g. DOD, DOE) capabilities (technology and human resources) to maximize resource utilization, create new jobs and accelerate technology transfer to address health care issues. During the second HCTP conference, in mid 1 995, a section of this meeting entitled: "Health Care Technology Assets of the Federal Government" addressed benefits of the technology transfer which should occur for maximizing already developed resources. Also a section entitled:"Transfer and Utilization of Government Technology Assets to the Private Sector", looked at both Health Care and non-Health Care related technologies since many areas such as Information Technologies (i.e. imaging, communications, archival I retrieval, systems integration, information display, multimedia, heterogeneous data bases, etc.) already exist and are part of our National Labs and/or other federal agencies, i.e. ARPA. These technologies although they are not labeled under "Health Care" programs they could provide enormous value to address technical needs. An additional issue deals with both the technical (hardware, software) and human expertise that resides within these labs and their possible role in creating cost effective solutions.
NASA Astrophysics Data System (ADS)
Kun, Luis G.
1995-10-01
During the first Health Care Technology Policy conference last year, during health care reform, four major issues were brought up in regards to the efforts underway to develop a computer based patient record (CBPR), the National Information Infrastructure (NII) as part of the high performance computers and communications (HPCC), and the so-called 'patient card.' More specifically it was explained how a national information system will greatly affect the way health care delivery is provided to the United States public and reduce its costs. These four issues were: (1) Constructing a national information infrastructure (NII); (2) Building a computer based patient record system; (3) Bringing the collective resources of our national laboratories to bear in developing and implementing the NII and CBPR, as well as a security system with which to safeguard the privacy rights of patients and the physician-patient privilege; (4) Utilizing government (e.g., DOD, DOE) capabilities (technology and human resources) to maximize resource utilization, create new jobs, and accelerate technology transfer to address health care issues. This year a section of this conference entitled: 'Health Care Technology Assets of the Federal Government' addresses benefits of the technology transfer which should occur for maximizing already developed resources. This section entitled: 'Transfer and Utilization of Government Technology Assets to the Private Sector,' will look at both health care and non-health care related technologies since many areas such as information technologies (i.e. imaging, communications, archival/retrieval, systems integration, information display, multimedia, heterogeneous data bases, etc.) already exist and are part of our national labs and/or other federal agencies, i.e., ARPA. These technologies although they are not labeled under health care programs they could provide enormous value to address technical needs. An additional issue deals with both the technical (hardware, software) and human expertise that resides within these labs and their possible role in creating cost effective solutions.
ERIC Educational Resources Information Center
Hermann, Jeffrey T.
1992-01-01
Every college should have a campuswide computer publishing policy. Policy options include (1) centralized publishing; (2) franchise, with a number of units doing their own publishing; or (3) limited, with the publications office producing the basics and assisting other units when feasible. To be successful, the policy must also be enforced. (MSE)
How Do Local School Districts Formulate Educational Technology Policy?
ERIC Educational Resources Information Center
Hunt, Jeffrey L.; Lockard, James
This study reports on the formulation of educational technology policy in three Illinois K-12 school districts (n=36). Major findings included: (1) educational policy formulation in the districts focused on collecting the objects of technology, such as computers, modems, networks, rather than viewing educational technology as a systematic process…
32 CFR 2400.32 - Transmittal of classified information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 2400.32 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION... classified information outside of the Office of Science and Technology Policy shall be in accordance with...
32 CFR 2400.32 - Transmittal of classified information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 2400.32 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION... classified information outside of the Office of Science and Technology Policy shall be in accordance with...
32 CFR 2400.32 - Transmittal of classified information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 2400.32 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION... classified information outside of the Office of Science and Technology Policy shall be in accordance with...
32 CFR 2400.32 - Transmittal of classified information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 2400.32 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION... classified information outside of the Office of Science and Technology Policy shall be in accordance with...
32 CFR 2400.32 - Transmittal of classified information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 2400.32 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION... classified information outside of the Office of Science and Technology Policy shall be in accordance with...