Does policy threat mobilise? 287(g) and Latino voter registration in North Carolina and Florida

Author(s):  
Eroll Kuhn
2021 ◽  
Vol 8 (2) ◽  
Author(s):  
Asher J Schranz ◽  
Nadya Belenky ◽  
Haley A Moss ◽  
Sonia Napravnik ◽  
David L Rosen

Abstract Persons with HIV (PWH) represent a socially and medically vulnerable population who often depend on public resources. We examined voter registration among PWH in North Carolina. Sixty-four percent were registered to vote. Registration was lower among PWH who were young, Hispanic, publicly insured or uninsured, and who had poor HIV health status.


Author(s):  
Thilina Ranbaduge ◽  
Anushka Vidanage ◽  
Sirintra Vaiwsri ◽  
Rainer Schnell ◽  
Peter Christen ◽  
...  

IntroductionDue to privacy concerns personal identifiers used for linking data often have to be encoded (masked) before being linked across organisations. Bloom filter (BF) encoding is a popular privacy technique that is now employed in real-world linkage applications. Recent research has however shown that BFs are vulnerable to cryptanalysis attacks. Objectives and ApproachAttacks on BFs either exploit that encoding frequent plain-text values (such as common names) results in corresponding frequent BFs, or they apply pattern mining to identify co-occurring BF bit positions that correspond to frequent encoded q-grams (sub-strings). In this study we empirically evaluated the privacy of individuals encoded in BFs against two recent cryptanalysis attack methods by Christen et al. (2017/2018). We used two snapshots of the North Carolina Voter Registration database for our evaluation, where pairs of records corresponding to the same voter (with name or address variations) resulted in files with 222,251 BFs and 224,061 plain-text records, respectively. ResultsWe encoded between two and four of the fields first and last name, street, and city into one BF per record. For combinations of three and four fields all plain-text values and BFs were unique, challenging any frequency-based attack. For hardening BFs, different suggested methods (balancing, random hashing, XOR, BLIP, and salting) were applied. Without any hardening applied up to 20.7% and 5% of plain-text values were correctly re-identified as 1-to-1 matches by both the pattern-mining and frequency-based attack methods, respectively. No more than 5\% correct 1-to-1 re-identification matches were achieved with the frequency-based attack on BFs encoding two fields when either balancing, random hashing, or XOR folding was applied; while the pattern-mining based attack was not successful in any correct re-identifications for any hardening technique. Conclusion/ImplicationsGiven that BF encoding is now being employed in real-world linkage applications, it is important to study the limits of this privacy technique. Our experimental evaluation shows that although basic BFs without hardening technique are susceptible to cryptanalysis attacks, some hardening techniques are able to protect BFs against these attacks.


1961 ◽  
Vol 30 (2) ◽  
pp. 153
Author(s):  
Virgil C. Stroud

Itinerario ◽  
2000 ◽  
Vol 24 (2) ◽  
pp. 146-169 ◽  
Author(s):  
Michael Leroy Oberg

In August of 1587 Manteo, an Indian from Croatoan Island, joined a group of English settlers in an attack on the native village of Dasemunkepeuc, located on the coast of present-day North Carolina. These colonists, amongst whom Manteo lived, had landed on Roanoke Island less than a month before, dumped there by a pilot more interested in hunting Spanish prize ships than in carrying colonists to their intended place of settlement along the Chesapeake Bay. The colonists had hoped to re-establish peaceful relations with area natives, and for that reason they relied upon Manteo to act as an interpreter, broker, and intercultural diplomat. The legacy of Anglo-Indian bitterness remaining from Ralph Lane's military settlement, however, which had hastily abandoned the island one year before, was too great for Manteo to overcome. The settlers found themselves that summer in the midst of hostile Indians.


2011 ◽  
Vol 21 (1) ◽  
pp. 30-34 ◽  
Author(s):  
Sena Crutchley

This article describes how a telepractice pilot project was used as a vehicle to train first-year graduate clinicians in speech-language pathology. To date, six graduate clinicians have been trained in the delivery of telepractice at The University of North Carolina at Greensboro. Components of telepractice training are described and the benefits and limitations of telepractice as part of clinical practicum are discussed. In addition, aspects of training support personnel involved in telepractice are outlined.


2009 ◽  
Vol 14 (2) ◽  
pp. 13-16
Author(s):  
Christopher R. Brigham ◽  
Jenny Walker

Abstract The AMAGuides to the Evaluation of Permanent Impairment (AMA Guides) is the most widely used basis for determining impairment and is used in state workers’ compensation systems, federal systems, automobile casualty, and personal injury, as well as by the majority of state workers’ compensation jurisdictions. Two tables summarize the edition of the AMA Guides used and provide information by state. The fifth edition (2000) is the most commonly used edition: California, Delaware, Georgia, Hawaii, Kentucky, New Hampshire, Idaho, Indiana, Iowa, Kentucky, Massachusetts, Nevada, North Dakota, Ohio, Vermont, and Washington. Eleven states use the sixth edition (2007): Alaska, Arizona, Louisiana, Mississippi, Montana, New Mexico, Oklahoma, Pennsylvania, Rhode Island, Tennessee, and Wyoming. Eight states still commonly make use of the fourth edition (1993): Alabama, Arkansas, Kansas, Maine, Maryland, South Dakota, Texas, and West Virginia. Two states use the Third Edition, Revised (1990): Colorado and Oregon. Connecticut does not stipulate which edition of the AMA Guides to use. Six states use their own state specific guidelines (Florida, Illinois, Minnesota, New York, North Carolina, and Wisconsin), and six states do not specify a specific guideline (Michigan, Missouri, Nebraska, New Jersey, South Carolina, and Virginia). Statutes may or may not specify which edition of the AMA Guides to use. Some states use their own guidelines for specific problems and use the Guides for other issues.


Sign in / Sign up

Export Citation Format

Share Document