837 resultados para Identity Projects


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The following data was derived from 1391 reports of participating contractors for the annual 2002 through 2011 reporting periods. The workforce data is reflective of one peak work week for highway contractors during the most active time of the season, the last full week of July. The summary data on pages 4 and 5 was compiled by Iowa DOT staff from the 1391 reports received. Interesting changes and trends have been addressed in the written analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Bridges Decision Support Model is a geographic information system (GIS) that assembles existing data on archaeological sites, surveys, and their geologic contexts to assess the risk of bridge replacement projects encountering 13,000- to 150-year-old Native American sites. This project identifies critical variables for assessing prehistoric sites potential, examines the quality of available data about the variables, and applies the data to creating a decision support framework for use by the Iowa Department of Transportation (Iowa DOT) and others. An analysis of previous archaeological surveys indicates that subsurface testing to discover buried sites became increasingly common after 1980, but did not become routine until after the adoption of guidelines recommending such testing, in 1993. Even then, the average depth of testing has been relatively shallow. Alluvial deposits of sufficient age, deposited in depositional environments conducive to human habitation, are considerably thicker than archaeologists have routinely tested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In June 2006, the Swiss Parliament made two important decisions with regards to public registers' governance and individuals' identification. It adopted a new law on the harmonisation of population registers in order to simplify statistical data collection and data exchange from around 4'000 decentralized registers, and it also approved the introduction of a Unique Person Identifier (UPI). The law is rather vague about the implementation of this harmonisation and even though many projects are currently being undertaken in this domain, most of them are quite technical. We believe there is a need for analysis tools and therefore we propose a conceptual framework based on three pillars (Privacy, Identity and Governance) to analyse the requirements in terms of data management for population registers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective July 1, 2007, the Iowa Civil Rights Act (Iowa Code Chapter 216) was expanded to add sexual orientation and gender identity to the list of protected classes. It is now ILLEGAL in Iowa to discriminate against a person because of his/her sexual orientation or gender identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, the Iowa Legislature approved approximately $475,000 to fund strategies for elder abuse detection, training and services in an effort to evaluate Iowa’s adult abuse system. This endeavor became known as Iowa’s Elder Abuse Initiative (EAI) demonstration projects. These projects were located in 4 of the 13 Area Agencies on Aging and available in 22 of Iowa’s 99 counties. The EAI focused on the prevention, intervention, detection, and reporting of elder abuse, neglect and exploitation by presenting elders with options to enhance their lifestyle choices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the second edition of the compendium. Since the first edition a number of important initiatives have been launched in the shape of large projects targeting integration of research infrastructure and new technology for toxicity studies and exposure monitoring.The demand for research in the area of human health and environmental safety management of nanotechnologies is present since a decade and identified by several landmark reports and studies. Several guidance documents have been published. It is not the intention of this compendium to report on these as they are widely available.It is also not the intention to publish scientific papers and research results as this task is covered by scientific conferences and the peer reviewed press.The intention of the compendium is to bring together researchers, create synergy in their work, and establish links and communication between them mainly during the actual research phase before publication of results. Towards this purpose we find useful to give emphasis to communication of projects strategic aims, extensive coverage of specific work objectives and of methods used in research, strengthening human capacities and laboratories infrastructure, supporting collaboration for common goals and joint elaboration of future plans, without compromising scientific publication potential or IP Rights.These targets are far from being achieved with the publication in its present shape. We shall continue working, though, and hope with the assistance of the research community to make significant progress. The publication will take the shape of a dynamic, frequently updated, web-based document available free of charge to all interested parties. Researchers in this domain are invited to join the effort, communicating the work being done. [Auteurs]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Program from the dedication of the Osage-Mitchell County RISE (Revitalize Iowa's Sound Economy) paving project on Sept. 27, 1989.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We argue that preferences for secession are the expression of a common unobserved mechanisms determining national identity. This paper examines the hypothesis of independence of both preferences for secession (independent Euskadi) and Basque national identity in the light of Akerloff and Kranton (2000). We deal with psychological determinants of individuals' national identity formation as well as those that influence the propensity of individuals to support the secession of their perceived ¿imagined community¿ or nation.. We undertake econometric survey analysis for the Basque Country using a bivariate probit model and publicly available data from the Spanish Centre for Sociological Research. Our results provide robust evidence of a common determination of national identity and political preferences for the secession of the Basque Country consistently with Akerloff and Kranton model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

False identity documents constitute a potential powerful source of forensic intelligence because they are essential elements of transnational crime and provide cover for organized crime. In previous work, a systematic profiling method using false documents' visual features has been built within a forensic intelligence model. In the current study, the comparison process and metrics lying at the heart of this profiling method are described and evaluated. This evaluation takes advantage of 347 false identity documents of four different types seized in two countries whose sources were known to be common or different (following police investigations and dismantling of counterfeit factories). Intra-source and inter-sources variations were evaluated through the computation of more than 7500 similarity scores. The profiling method could thus be validated and its performance assessed using two complementary approaches to measuring type I and type II error rates: a binary classification and the computation of likelihood ratios. Very low error rates were measured across the four document types, demonstrating the validity and robustness of the method to link documents to a common source or to differentiate them. These results pave the way for an operational implementation of a systematic profiling process integrated in a developed forensic intelligence model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Department of Transportation (Iowa DOT) currently performs wetland mitigation on a project-by-project basis. At the same time, other agencies like the Iowa Department of Natural Resources and Natural Resource Conservation Service are performing wetland restoration projects, and counties and cities may be mitigating wetland losses as well. This project examined the feasibility of developing cooperative wetland mitigation projects in order to utilize state and local resources more efficiently to benefit both Iowa and local communities. The project accomplished the following objectives: (1) Identified and characterized cooperative wetland mitigation programs nationwide; (2) Developed a needs assessment through a survey of state, county, and large city agencies in Iowa to describe wetland mitigation programs and determine challenges with mitigation and program improvements, including long-term risks associated with maintenance and monitoring programs; (3) Surveyed state, county, and city agencies and organizations to identify resources available for developing cooperative mitigation projects and procedures; (4) Developed a conceptual framework for cooperative wetland mitigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power Fund Awarded Projects from the Office of Energy Independence.