Health Reform: Designing a Marketplace — A state-by-state comparison of Marketplace Implementation
Source: Center on Budget and Policy Priorities
The Affordable Care Act (ACA) creates a Health Insurance Marketplace (Marketplace) in every state, which offers individuals and small businesses the opportunity to shop from an array of affordable, comprehensive health insurance plans. A state can either create and operate the Marketplace itself as a State-based Marketplace (SBM), partner with the federal government under a State Partnership Marketplace (SPM), or defer to the U.S. Department of Health and Human Services to manage a Federally-facilitated Marketplace (FFM) in the state.
In 2014, 16 states and the District of Columbia have established a State-based Marketplace for both individuals and small businesses, six states have a State Partnership Marketplace, and one state is administering a State-based SHOP Marketplace just for small businesses (with an FFM serving individuals).
The ACA provides states with significant flexibility in the design and structure of their Marketplace; hundreds of policy and operational decisions had to be addressed during the Marketplace implementation process. CBPP has evaluated SBM and SPM states across a number of these Marketplace design questions and compiled the information in this interactive tool.
AARP Online Travel Study
Source: AARP Research
Those who are 50 or older take about six non-business related overnight trips of at least 50 miles from home per year.
Are you ready for the resource revolution?
Source: McKinsey & Company
Meeting increasing global demand requires dramatically improving resource productivity. Yet technological advances mean companies have an extraordinary opportunity not only to meet that challenge but to spark the next industrial revolution as well.
Lost and Found: Understanding Technologies Used to Locate Missing Persons with Alzheimer’s or Dementia
Lost and Found: Understanding Technologies Used to Locate Missing Persons with Alzheimer’s or Dementia (PDF)
Source: Bureau of Justice Assistance
Alzheimer’s disease and other forms of dementia affect not only those who are living with the disease; these afflictions also impact the caregivers, law enforcement, and even neighbors. As the disease progresses, physical and mental capabilities are negatively impacted, short-term memory loss increases, and a person with Alzheimer’s might begin living in the past. As the person attempts to return to former places of employment or residences, they often get lost and need assistance returning to where they are currently residing. It is never possible to predict if or when a person with Alzheimer’s will wander or be unable to navigate familiar routes. Initiating a search for a person with Alzheimer’s can never be delayed, and conducting such searches can prove to be costly and consume extreme amounts of agency resources. It is crucial for law enforcement officers and other first responders to be familiar with and understand the signs of dementia and be aware of passive identification products used to identify persons with Alzheimer’s. In addition to passive identification techniques, there are technologies and products available that can be used to actively locate an individual who is lost.
Cellular location techniques and Global Positioning System devices are examples of proven methods for aiding law enforcement in a search for a missing person with dementia. This document will provide a technical description of these technologies and outline some of the advantages and disadvantages when employing these products. It will also provide comprehensive lists of locating devices that are currently available. Provided in each section is a short technical description of the technology and its advantages and the disadvantages. Appendix I and Appendix II provide a list of passive and active locating devices currently available.
Occupational Outlook Quarterly — Spring 2014
Source: Bureau of Labor Statistics
- STEM 101: Intro to tomorrow’s jobs
- Careers with options: Occupations with jobs in many industries
- Healthcare: Millions of jobs now and in the future
- My career: Veterinary technician
- Brief items of interest to counselors and students
- You’re a what? Roastmaster
- More education, less unemployment
Tech Trade in the States: A State by State Overview of International Trade in Tech Goods (PDF)
Source: Tech America Foundation
TechAmerica Foundation proudly presents our 2014 edition of Tech Trade in the States: A State-by-State Overview of International Trade of Tech Goods. It provides 2012 data on tech trade at the national level and export data for all 50 states, the District of Columbia, and Puerto Rico. The report also provides an estimate as to the number of jobs that are supported by export activities.
Preliminary Opinion of the European Data Protection Supervisor — Privacy and competitiveness in the age of big data: The interplay between data protection, competition law and consumer protection in the Digital Economy
Privacy and competitiveness in the age of big data: The interplay between data protection, competition law and consumer protection in the Digital Economy (PDF)
Source: European Data Protection Supervisor
EU approaches to data protection, competition and consumer protection share common goals, including the promotion of growth, innovation and the welfare of individual consumers. In practice, however, collaboration between policy-makers in these respective fields is limited.
Online services are driving the huge growth in the digital economy. Many of those services are marketed as ‘free’ but in effect require payment in the form of personal information from customers. An investigation into the costs and benefits of these exchanges for both consumers and businesses is now overdue.
Closer dialogue between regulators and experts across policy boundaries can not only aid enforcement of rules on competition and consumer protection, but also stimulate the market for privacy-enhancing services.
CRS — Navy Shipboard Lasers for Surface, Air, and Missile Defense: Background and Issues for Congress
Navy Shipboard Lasers for Surface, Air, and Missile Defense: Background and Issues for Congress (PDF)
Source: Congressional Research Service (via Federation of American Scientists)
Department of Defense (DOD) development work on high-energy military lasers, which has been underway for decades, has reached the point where lasers capable of countering certain surface and air targets at ranges of about a mile could be made ready for installation on Navy surface ships over the next few years. More powerful shipboard lasers, which could become ready for installation in subsequent years, could provide Navy surface ships with an ability to counter a wider range of surface and air targets at ranges of up to about 10 miles.
Access to Broadband Networks: The Net Neutrality Debate (PDF)
Source: Congressional Research Service (via National Agricultural Law Library)
As congressional policymakers continue to debate telecommunications reform, a major point of contention is the question of whether action is needed to ensure unfettered access to the Internet. The move to place restrictions on the owners of the networks that compose and provide access to the Internet, to ensure equal access and non-discriminatory treatment, is referred to as “net neutrality.” While there is no single accepted definition of “net neutrality,” most agree that any such definition should include the general principles that owners of the networks that compose and provide access to the Internet should not control how consumers lawfully use that network, and they should not be able to discriminate against content provider access to that network.
A major focus in the debate is concern over whether it is necessary for policymakers to take steps to ensure access to the Internet for content, services, and applications providers, as well as consumers, and if so, what these steps should be. Some policymakers contend that more specific regulatory guidelines may be necessary to protect the marketplace from potential abuses which could threaten the net neutrality concept. Others contend that existing laws and policies are sufficient to deal with potential anti-competitive behavior and that additional regulations would have negative effects on the expansion and future development of the Internet.
The January 2014 decision by the U.S. Court of Appeals, D.C. Circuit (Verizon Communications Inc. v. Federal Communications Commission, D.C. Cir., No.11-1355) upholding the Federal Communications Commission’s (FCC) authority to use Section 706 of the Telecommunications Act of 1996 to regulate broadband providers, but striking down the specific anti-blocking and nondiscrimination rules of the FCC’s 2010 Open Internet Order has focused attention on the issue. Three measures (H.R. 3982, H.R. 4070, and S. 1981) have been introduced in direct response to the January 2014 court decision, and subsequent FCC action. A consensus on the net neutrality issue has remained elusive. Some Members of Congress support FCC regulation of broadband providers, others feel that the regulation of the Internet is not only unnecessary, but harmful. It is anticipated that the issue of access to broadband networks will be of continued interest to policymakers.
Bored Tuesdays and Focused Afternoons: The Rhythm of Attention and Online Activity in the Workplace
Source: Microsoft Research
While distractions due to digital media have received attention in HCI, we examine instead focused attention in the workplace. We logged digital activity and continually probed perspectives of 32 information workers for five days in situ to understand how attentional states change with context. We present a framework of how engagement and challenge in work relate to focus, bored, and rote work. Overall, we find more focused attention than boredom in the workplace. Reported focus peaks mid-afternoon while boredom is highest in the morning. People are happiest doing rote work; we show that focused work can involve stress. We identified higher levels of boredom mid-week. Online activities are associated with different attentional states, showing different patterns at beginning and end of day, and before and after a mid-day break. Our study shows how rhythms of attentional states are associated with context.
The State of the Discordant Union: An Empirical Analysis of DMCA Takedown Notices
Source: Virginia Journal of Law and Technology, Forthcoming (via SSRN)
By conducting a census on half-a-million takedown notices and more than 50 million takedown requests in its datasets, this paper takes a detailed and systematic look at the state of the takedown process from an empirical perspective. It examines the use and issuance of takedown notices by copyright owners and reporters and the response of service providers to them. It further studies the relationship between the notices and requests and safe harbor provisions of the Digital Millennium Copyright Act, and identifies ways in which the takedown process can be further improved to preserve the diversity and freedom of the Internet.
Information and Incentives in Online Affiliate Marketing (PDF)
Source: Harvard Business School Working Papers
We examine online affiliate marketing programs in which merchants oversee thousands of affiliates they have never met. Some merchants hire outside specialists to set and enforce policies for affiliates, while other merchants ask their ordinary marketing staff to perform these functions. For clear violations of applicable rules, we find that outside specialists are most effective at excluding the responsible affiliates, which we interpret as a benefit of specialization. However, in-house staff are more successful at identifying and excluding affiliates whose practices are viewed as “borderline” (albeit still contrary to merchants’ interests), foregoing the efficiencies of specialization in favor of the better incentives of a company’s staff. We consider the implications for marketing of online affiliate programs and for online marketing more generally.
Identifying Personality Disorders that are Security Risks: Field Test Results (PDF)
Source: Defense Personnel Security Research Center
Accurate identification and assessment of employees with risky personality disorders is imperative for programs that involve access to nuclear materials, weapons, and biological select agents which depend on personnel maintaining mental health and reliable behavior. Certain risky personality disorders, however, are especially difficult to diagnose with routine assessment tools that rely on the subject’s self-report. To combat this issue, PERSEREC, in collaboration with Department of Energy, initiated a field test that examined whether an improved screening tool has utility for clinicians who routinely evaluate personnel in a high-risk program. Five clinicians used the Shedler-Westen Assessment Procedure (SWAP), along with its Dispositional Indicators of Risk Exposure (DIRE) subscale developed earlier, for a period of 4 months to evaluate 26 new candidates and current employees of concern. Debriefing interviews indicated that SWAP/DIRE was more effective than clinicians’ existing tools for establishing a positive rapport with the subject, assessing personality disorders, and making legally-defensible recommendations. Findings also include recommendations for using SWAP/DIRE methodology for identifying risky personnel.
Inspector Report: DOE/IG-0904 Review of Controls Over the Department’s Classification of National Security Information
Inspector Report: DOE/IG-0904 Review of Controls Over the Department’s Classification of National Security Information
Source: U.S. Department of Energy, Office of Inspector General
The Department of Energy handles and manages a broad spectrum of classified information, including National Security Information (NSI). The Office of Health, Safety and Security’s Office of Classification, manages the Department-wide classification program and establishes policies to conform with Federal classification requirements. Implementation of classification requirements is shared among various organizations within the Department. In addition, the Department’s Office of Intelligence and Counterintelligence is required to follow NSI policies and procedures instituted by the Office of the Director of National Intelligence. Similarly, the Department’s National Nuclear Security Administration (NNSA) separately develops and implements policies and procedures, in coordination with the Office of Classification, for the protection and security of classified information at NNSA sites.
Our inspection revealed that the Department had established and implemented critical elements of its classified NSI program. However, our review revealed that certain aspects of the NSI program could be improved. For instance, our inspection determined that a classification marking tool embedded in the classified email system at an NNSA site automatically marked emails as Secret//Restricted Data, regardless of content. The classification related issues we observed occurred, in part, because of ineffective oversight of classification activities and inadequate training and guidance.
In general, we found management’s comments and planned corrective actions to be generally responsive to our report findings and recommendations.
How government can promote open data
Source: McKinsey & Company
Institutions and companies across the public and private sectors have begun to release and share vast amounts of information in recent years, and the trend is only accelerating. Yet while some information is easily accessible, some is still trapped in paper records. Data may be free or come at a cost. And there are tremendous differences in reuse and redistribution rights. In short, there are degrees when it comes to just how “open” data is and, as a result, how much value it can create.
While businesses and other private organizations can make more information public, we believe that government has a critical role in unleashing the economic potential of open data. A recent McKinsey report, Open data: Unlocking innovation and performance with liquid information,1 identified more than $3 trillion in economic value globally that could be generated each year in seven domains through increasingly “liquid” information that is machine readable, accessible to a broad audience at little or no cost, and capable of being shared and distributed. These sources of value include new or increased revenue, savings, and economic surplus that flow from the insights provided by data as diverse as census demographics, crop reports, and information on product recalls.